port 8443 [Initial access]

This port has a website hosted named UniFI with version number 6.4.52.

On searching, I found one exploit related to this version of software. With CVE as "CVE-2021-4422".

This exploit is related to Log4j Remote Code Execution.

The above article will guide you on how to perform the attack.

circle-info

we need to install Java and Maven first.

Normally, Kali Linux has Java installed in it. You can check using the below command:

if not present then install it.

We can install Maven using below command:

First, we need to clone and build the tool, rogue-jndi from the GitHub repository linked below:

This above command will do everything that is needed.

Now we will craft the reverse shell.

With that Base64 output, build your command in rogue-jndi:

Replace the hostname variable with the public or local IP of the host you will run the command from. Then start your rogue-jndi LDAP server up.

Now we will make modifications in the request we have captured using Burp Suite and then send it.

Now after that, you will get the shell.

Although, In the response, we got the error we can see that we got a connection in the listener.

stabilize the shell.

No python is present here.

I will upgrade the shell using the script command.

triangle-exclamation

Last updated

Was this helpful?