18 hours 43 minutes
Welcome to the public exploit lab walkthrough.
So let's search and maps can.
S. V S C.
If you realize I make a lot of mistakes with my keyboard, it's because I have a mechanical keyboard here and I don't want to be two Clickety clackety
when I'm doing these demos. So I'm going off of my
max uh, keyboard, which I'm not as used to.
So you'll notice I get I see port 21 21 is open,
which is our clue. Our first clue.
So what's port 21
And you'll notice in these scans there are other ports open and that's to kind of throw you off.
But you may also see these in the UK labs or whatever. CTF you're doing
that multiple ports are open and it's a little confusing.
So what's so important 21 21 It's Konica Minolta ftp utility. It was FTp. I should be able to interact with it
and I did kind of throw this one at you because I changed the port.
So you'll see that it's on Port 21 21. I can log in trying to log in with anonymous
and you can see that I don't so I need to figure out how to get on this.
Well if you google, what's the default
username and password ftp,
and you can see you're logged in now. Right,
So that's our clue there.
The other clue of course is we have a folder on the desktop that gives us an exploit.
So Konica Minolta ftp utility 10 is what we're dealing with. Right,
well let's look at this code here so we know there's MSF venom involved. We know that there's a hard coded I. P. So we of course need to change this
and I will tell you if you're frustrated in the labs uh and you watch these videos and you're like this takes clint like so it's not it takes them so quickly. So at doing this.
the exploitation path when you do it it is quick. It just it takes you hours to figure this out. Sometimes sometimes it doesn't sometimes it takes two minutes.
So I'm changing this to the I. P. Address of our victim or are other windows box
And Port 21 21.
So I need to change this too. Right?
It's not anonymous.
It's admin is our user and our password is password.
So now what I need to do is take MSF venom.
You have to love the little
from the labs.
So I'll take this.
I need to modify this.
So we need to make this our box.
Listening Ports 4 444.
So he grabbed this
And what we'll do now is change this.
we'll save this.
We need our listener.
What's your mod plus?
X. On exploit.
And then exploit.
Doesn't like that.
Do python two.
And there we see we have our show.
You'll see. I typically run the same command when I'm in a box. Right? Who am I? Or
Or I'd if I'm on Lennox
I just want to know who I am and I want to know that I. P. Address to make sure I'm actually on the box that I intended to.
Sometimes you might find out you're on a different box. So that's always interesting.
But we know our victim is 1921681175.
So this can be a short one if people not to modify code and look at it.
Um or if you're just learning, this could take you a long time to figure out,
but it's just getting that practice down of looking at that code and modifying it to fit your environment.
Introduction to IT & Cybersecurity
Are you new to IT & cybersecurity and wondering which role might suit you best? ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Penetration Testing and Ethical Hacking
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform ...
7 CEU/CPE Hours Available
Certificate of Completion Offered