This video demonstrates an attack on the Tomcat service on the metasploitable hackable box.
"Metasploitable is an Ubuntu 8.04 server install on a VMWare 6.5 image. A number of vulnerable packages are included, including an install of tomcat 5.5 (with weak credentials), distcc, tikiwiki, twiki, and an older mysql." - blog.metasploit.com
"Apache Tomcat is an open source software implementation of the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed under the Java Community Process." - tomcat.apache.org
Links
Watch video on-line:
Download video: http://download.g0tmi1k.com/videos_archive/Metasploitable-TomCat.mp4
Download (debian_ssh_rsa_2048_x86.tar.bz2): *Coming soon*
Download (usernames.lst): Coming soon
Download (passwords.lst): Coming soon
Method
- Use Nmap to scanthe network (gathering information)
- Use Nmap to do a more detailed scan of the target (gathering information)
- Use Metasploit to brute force the login (gaining access)
- Use Metasploit to send a payload (remote access)
- I cheated a little bit here as I had used nessus in a previous scan to discover "Debian OpenSSH/OpenSSL Package Random Number Generator Weakness"
- Via the payload it is possible to capture the SSH Key and compare it against the weak keys Just like pWnOS (escalating privileges)
- Connect via SSH as root (complete access)
- Prove complete access by cracking the shadow file with John The Ripper (then prove it by connecting via SSH using one of the newly acquired accounts)
Tools
- Nmap - on Backtrack 4 (Final)
- Metasploit - on Backtrack 4 (Final)
- SSH - on Backtrack 4 (Final) > John The Ripper - on BackTrack!
- Dictionaries/Word-lists - Coming soon
- Weak SSH Keys (debian_ssh_rsa_2048_x86.tar.bz2) -Coming soon
- Metasploitable.vmdk (SHA-1: 7DF98130DAC3167690209716EBF86047C6B9672F)
Commands
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 |
|
Notes
Song: Underworld - Cowgirl
Video length: 7:07
Capture length: 11:17
Blog Post: https://blog.g0tmi1k.com/2010/07/metasploitable-tomcat/