ClamAV
Writeup for ClamAV from Offensive Security Proving Grounds (PG)
Last updated
Writeup for ClamAV from Offensive Security Proving Grounds (PG)
Last updated
nmapAutomator.sh -H 192.168.66.42 -t full
nmapAutomator.sh -H 192.168.66.42 -t vulns
There is a page with a binary message.
Challenge accepted!
We can see that Sendmail 8.13.4 is used.
We find the following Sendmail + ClamAV RCE exploit:
The two lines in the Perl script:
appear to open port 31337 as a root shell.
After running the script, the port is indeed open.
Upon connecting to the bind shell, use bash -i
to upgrade to a fully interactive shell.