From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Exploiting rejetto

Exploiting rejetto

- [Instructor] I'm VPN'd into our LinkedIn Learning Lab, and on the lab, we can find a target with IP address 10.10.10.8. Let's run a port enumeration using nmap to get a sense of what we're targeting. nmap -PS - sV 10.10.10.8, okay, we have a Windows host with only Port 80 open and running an HTTP file server. Let's see what's there. When we access the URL, there's a user portal. If we hover over the file server link, we can see that this is a Rejetto file server. We can search for an exploit for Rejetto using searchploit, searchploit rejetto. Okay, we got a number of options here. There's a Ruby exploit, so likely a Metasploit option, but let's do this one natively. We'll have a look at 39161.py. We'll copy /usr/share/exploitdb/ exploits/windows/remote/39161.py, and we'll copy that to 39161.py. Let's have a look at it. In the comments, we can see that we call the script with the IP address and the port of the…

Contents