When a device is vulnerable to code execution, an attacker or penetration tester is allowed to execute code remotely on the target server. Additionally, the penetration tester will be able to retrieve the source code that's stored on the target.
To complete this exercise, we will be using the following topology:
To get started with code execution exploitation, follow these steps:
- We will attempt to discover whether the target is vulnerable to CVE-2012-1823. To discover whether a target is vulnerable, use the following commands with nmap:
nmap -p80 --script http-vuln-cve2012-1823 <target IP address>
Nmap may not always return results that indicate that a vulnerability exists on a target. However, this should not stop you from determining whether a target is vulnerable to an exploit.
- Next, within Metasploit, use the search...