Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Quick connect
- QuickConnect lets you connect to servers without adding them to your administrative panel. when instaciado a fast connection it is added in recentservers.xml file.
- Danger?
- Yes the same way that you can read these files. Malicious applications can do the same, and can be read also on web servers.
- ex:
- www.target.com.br/folder/{file.xml}
- www.target.com.br/microsite/geo243/FileZilla.xml www.target.com.br/149224/prg/programok/Total%20Commander/FileZilla/recentservers.xml
- Other files:
- sitemanager.xml
- recentservers.xml
- filezilla.xml
- bookmarks.xml
- filters.xml
- layout.xml
- queue.xml
- Looking for vulnerable servers
- Now let's use the inurlbr tool to search sites with such breach and confirm such information.
- Download tool:
- https://github.com/googleinurl/SCANNER-INURLBR
- Setting command:
- using search engines..
- SET DORK:
- Choose your dork search
- "\FileZilla\" ext:xml
- inurl:"\FileZilla\" & inurl:sitemanager.xml -github -sourceforge
- inurl:"\FileZilla\" & inurl:recentservers.xml -github -sourceforge
- inurl:"\FileZilla\" & inurl:filezilla.xml -github -sourceforge
- inurl:"\FileZilla\" & inurl:bookmarks.xml -github -sourceforge
- inurl:"\FileZilla\" & inurl:filters.xml -github -sourceforge
- inurl:"\FileZilla\" & inurl:layout.xml -github -sourceforge
- inurl:"\FileZilla\" & inurl:queue.xml -github -sourceforge
- inurl:sitemanager.xml & ext:xml & -github -sourceforge
- inurl:recentservers.xml & ext:xml & -github -sourceforge
- inurl:filezilla.xml & ext:xml & -github -sourceforge
- inurl:bookmarks.xml & ext:xml & -github -sourceforge
- inurl:filters.xml & ext:xml & -github -sourceforge
- inurl:layout.xml & ext:xml & -github -sourceforge
- inurl:queue.xml & ext:xml & -github -sourceforge
- inurl:"\FileZilla\" & inurl:(sitemanager.xml | recentservers.xml | filezilla.xml | filters.xml | bookmarks.xml | layout.xml | queue.xml) ext:xml -github -sourceforge
- --dork 'YOU_DORK'
- - Setting: --dork '"\FileZilla\" ext:xml'
- SET FILE OUTPUT:
- - Setting: -s filezilla.txt
- SET TIPE VALIDATION:
- - Setting: -t 2
- 2 The second type tries to valid the error defined by: -a 'VALUE_INSIDE_THE _TARGET' It also establishes connection with the exploit through the get method.
- SET STRING VALIDATION:
- Specify the string that will be used on the search script:
- Example: -a {string}
- Usage: -a '<title>hello world</title>'
- If specific value is found in the target he is considered vulnerable.
- - Setting: -a '<FileZilla3>'
- All filezilla file there is a primary tag called <FileZilla3>. It is trough this that we will validate.
Add Comment
Please, Sign In to add comment