fixing whitespaces
parent
39b228bb39
commit
8ad80ea3d6
|
@ -8,16 +8,12 @@ This module exploits a vulnerability found in ManageEngine Desktop Central 9. Wh
|
|||
|
||||
Desktop Central is integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.It is used for automating your regular desktop management routines like installing patches, distributing software, managing your IT Assets, managing software licenses, monitoring software usage statistics, managing USB device usage, taking control of remote desktops, and more. It supports managing both Windows, Mac and Linux operating systems.
|
||||
|
||||
|
||||
|
||||
## Prerequisites
|
||||
|
||||
|
||||
1. Start a Windows VM (such as Win 7)
|
||||
2. Install a vulnerable version of ManageEngine Desktop Central. This exploit was tested on Build 90109 and 91084. You can find the archive here: http://archives.manageengine.com/desktop-central/
|
||||
3. After installation, verify that the server is working by visiting it with a browser. Depending on the version, the server port may be 8020, or 8040.
|
||||
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Do: ```use exploit/windows/http/manageengine_connectionid_write```
|
||||
|
@ -25,7 +21,6 @@ Desktop Central is integrated desktop and mobile device management software that
|
|||
3. Do: ```check```
|
||||
4. Do: ```run```
|
||||
|
||||
|
||||
##Sample Output
|
||||
|
||||
```
|
||||
|
@ -52,5 +47,3 @@ Server username: NT AUTHORITY\SYSTEM
|
|||
meterpreter >
|
||||
|
||||
```
|
||||
|
||||
|
||||
|
|
Loading…
Reference in New Issue