From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Exploiting rejetto - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Exploiting rejetto
- [Instructor] I'm VPN'd into our LinkedIn Learning Lab, and on the lab, we can find a target with IP address 10.10.10.8. Let's run a port enumeration using nmap to get a sense of what we're targeting. nmap -PS - sV 10.10.10.8, okay, we have a Windows host with only Port 80 open and running an HTTP file server. Let's see what's there. When we access the URL, there's a user portal. If we hover over the file server link, we can see that this is a Rejetto file server. We can search for an exploit for Rejetto using searchploit, searchploit rejetto. Okay, we got a number of options here. There's a Ruby exploit, so likely a Metasploit option, but let's do this one natively. We'll have a look at 39161.py. We'll copy /usr/share/exploitdb/ exploits/windows/remote/39161.py, and we'll copy that to 39161.py. Let's have a look at it. In the comments, we can see that we call the script with the IP address and the port of the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.