{"id":6164,"date":"2013-04-02T15:09:42","date_gmt":"2013-04-02T18:09:42","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=6164"},"modified":"2019-07-16T13:41:14","modified_gmt":"2019-07-16T16:41:14","slug":"exploit-webdav-xampp-1-73","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2013\/04\/exploits\/exploit-webdav-xampp-1-73\/","title":{"rendered":"Exploit WebDAV XAMPP 1.73"},"content":{"rendered":"<p>Neste pequeno tutorial exploraremos vulnerabilidade WedDAV XAMPP 1.73 e<br \/>\nganharemos acesso ao servidor:<\/p>\n<p><strong>Alvos :<\/strong><br \/>\nXAMPP 1.73<\/p>\n<p>Windows XP, 7 e 8<\/p>\n<p><strong>Ferramentas:<\/strong><br \/>\nMetasploit<\/p>\n<p><strong>PC V\u00edtima<\/strong><\/p>\n<p>(Windows 8)<\/p>\n<p>&#8220;ATEN\u00c7\u00c3O NENHUMA M\u00c1QUINA FOI INVADIDA E OS TESTES FORAM EXECUTADOS<br \/>\nEM LABORAT\u00d3RIO CONFINADO&#8221;<\/p>\n<p><strong>N\u00edvel de dificuldade:<\/strong><\/p>\n<p>B\u00c1SICO (INICIANTE)<\/p>\n<p>&nbsp;<\/p>\n<p>1\u00ba) Passo XAMPP ativo em uma m\u00e1quina Windows 8<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/124.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6165\" title=\"1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/124-300x185.png\"  alt=\"\" width=\"300\" height=\"185\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/124-300x185.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/124-1024x634.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/124.png 1120w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\n2\u00b0) No Backtrack, acessar msfconsole<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/218.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6166\" title=\"2\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/218-300x203.png\"  alt=\"\" width=\"300\" height=\"203\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/218-300x203.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/218.png 870w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>3\u00b0) Preparar exploit<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/314.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6167\" title=\"3\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/314-300x203.png\"  alt=\"\" width=\"300\" height=\"203\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/314-300x203.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/314.png 871w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\n4\u00b0) Setar IP m\u00e1quina alvo e IP m\u00e1quina Local<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/413.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6168\" title=\"4\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/413-300x203.png\"  alt=\"\" width=\"300\" height=\"203\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/413-300x203.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/413.png 871w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\n5\u00ba) Setar Payload e Exploitar<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/511.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6169\" title=\"5\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/511-300x204.png\"  alt=\"\" width=\"300\" height=\"204\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/511-300x204.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/511.png 869w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\n6\u00ba) Comandos m\u00e1quina remota SYSINFO e SHELL<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/610.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6170\" title=\"6\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/610-300x207.png\"  alt=\"\" width=\"300\" height=\"207\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/610-300x207.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/610.png 869w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/186048_100001838322519_1550894_n-11668_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p>Autor: S\u00edlvio C\u00e9sar Roxo Giavaroto<\/p>\n<p>\u00c9 MBA Especialista em Gest\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o,\nTecn\u00f3logo em Redes de Computadores, C|EH Certified Ethical Hacker,\natua como Pentest e Analista de Seguran\u00e7a em Servidores Linux no\nGoverno do Estado de S\u00e3o Paulo, Professor Universit\u00e1rio , Instrutor\nC|EH e C|HFI.<\/p>\r\n\t\t<\/div> <!-- .author-info --><\/p>\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes -->\n","protected":false},"excerpt":{"rendered":"<p>Neste pequeno tutorial exploraremos vulnerabilidade WedDAV XAMPP 1.73 e ganharemos acesso ao servidor: Alvos : XAMPP 1.73 Windows XP, 7 e 8 Ferramentas: Metasploit PC V\u00edtima (Windows 8) &#8220;ATEN\u00c7\u00c3O NENHUMA M\u00c1QUINA FOI INVADIDA E OS TESTES FORAM EXECUTADOS EM LABORAT\u00d3RIO CONFINADO&#8221; N\u00edvel de dificuldade: B\u00c1SICO (INICIANTE) &nbsp; 1\u00ba) Passo XAMPP ativo em uma m\u00e1quina Windows [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6171,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,101],"tags":[],"class_list":["post-6164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exploits","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=6164"}],"version-history":[{"count":4,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6164\/revisions"}],"predecessor-version":[{"id":10508,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6164\/revisions\/10508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/6171"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=6164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=6164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=6164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}