Add ManageEngine Desktop Central Vuln to Metasploitable3
This commit is contained in:
parent
26da533c99
commit
26545cbd68
|
@ -24,8 +24,8 @@ Vagrant.configure("2") do |config|
|
|||
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
||||
|
||||
# Add users and add to groups
|
||||
config.vm.provision :shell, path: "scripts/configs/create_users.bat"
|
||||
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
||||
#config.vm.provision :shell, path: "scripts/configs/create_users.bat"
|
||||
#config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
||||
|
||||
# Vulnerability - Unpatched IIS and FTP
|
||||
config.vm.provision :shell, path: "scripts/installs/setup_iis.bat"
|
||||
|
@ -88,6 +88,10 @@ Vagrant.configure("2") do |config|
|
|||
config.vm.provision :shell, path: "scripts/installs/setup_mysql.bat"
|
||||
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
||||
|
||||
# Vulnerability - ManageEngine Desktop Central
|
||||
config.vm.provision :shell, path: "scripts/installs/install_manageengine.bat"
|
||||
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
||||
|
||||
# Vulnerability - Axis2
|
||||
config.vm.provision :shell, path: "scripts/installs/setup_axis2.bat"
|
||||
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
||||
|
|
Binary file not shown.
|
@ -0,0 +1,44 @@
|
|||
[InstallShield Silent]
|
||||
Version=v7.00
|
||||
File=Response File
|
||||
[File Transfer]
|
||||
OverwrittenReadOnly=NoToAll
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-DlgOrder]
|
||||
Dlg0={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdWelcome-0
|
||||
Count=9
|
||||
Dlg1={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdLicense-0
|
||||
Dlg2={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdAskDestPath-0
|
||||
Dlg3={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-MessageBox-0
|
||||
Dlg4={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-AskText-0
|
||||
Dlg5={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdSelectFolder-0
|
||||
Dlg6={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdStartCopy-0
|
||||
Dlg7={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdShowMailPanel-20319
|
||||
Dlg8={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdFinish-0
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdWelcome-0]
|
||||
Result=1
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdLicense-0]
|
||||
Result=1
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdAskDestPath-0]
|
||||
szDir=C:\ManageEngine
|
||||
Result=1
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-MessageBox-0]
|
||||
Result=1
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-AskText-0]
|
||||
szText=8020
|
||||
Result=1
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdSelectFolder-0]
|
||||
szFolder=ManageEngine Desktop Central
|
||||
Result=1
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdStartCopy-0]
|
||||
Result=1
|
||||
[Application]
|
||||
Name=ManageEngine Desktop Central
|
||||
Version=9.0.0
|
||||
Company=ZOHO Corp
|
||||
Lang=0409
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdShowMailPanel-20319]
|
||||
Result=1
|
||||
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdFinish-0]
|
||||
Result=1
|
||||
bOpt1=0
|
||||
bOpt2=1
|
|
@ -1,4 +1,4 @@
|
|||
netsh advfirewall firewall add rule name="Open Port 8383 for Jenkins" dir=in action=allow protocol=TCP localport=8383
|
||||
netsh advfirewall firewall add rule name="Open Port 8484 for Jenkins" dir=in action=allow protocol=TCP localport=8484
|
||||
netsh advfirewall firewall add rule name="Open Port 5985 for WinRM" dir=in action=allow protocol=TCP localport=5985
|
||||
netsh advfirewall firewall add rule name="Open Port 8282 for Apache Struts" dir=in action=allow protocol=TCP localport=8282
|
||||
netsh advfirewall firewall add rule name="Open Port 80 for IIS" dir=in action=allow protocol=TCP localport=80
|
||||
|
@ -9,3 +9,6 @@ netsh advfirewall firewall add rule name="Open Port 8585 for Wordpress and phpMy
|
|||
netsh advfirewall firewall add rule name="Java 1.6 java.exe" dir=in action=allow program="C:\openjdk6\openjdk-1.6.0-unofficial-b27-windows-amd64\jre\bin\java.exe" enable=yes
|
||||
netsh advfirewall firewall add rule name="Open Port 3000 for Rails Server" dir=in action=allow protocol=TCP localport=3000
|
||||
netsh advfirewall firewall add rule name="Open Port 3306 for MySQL" dir=in action=allow protocol=TCP localport=3306
|
||||
netsh advfirewall firewall add rule name="Open Port 8020 for ManageEngine Desktop Central" dir=in action=allow protocol=TCP localport=8020
|
||||
netsh advfirewall firewall add rule name="Open Port 8383 for ManageEngine Desktop Central" dir=in action=allow protocol=TCP localport=8383
|
||||
netsh advfirewall firewall add rule name="Open Port 8022 for ManageEngine Desktop Central" dir=in action=allow protocol=TCP localport=8022
|
||||
|
|
|
@ -0,0 +1,2 @@
|
|||
powershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://archives.manageengine.com/desktop-central/91084/ManageEngine_DesktopCentral.exe', 'C:\Windows\Temp\ManageEngine_DesktopCentral.exe')" <NUL
|
||||
start /WAIT C:\Windows\Temp\ManageEngine_DesktopCentral.exe /w /s /f1C:\Vagrant\resources\manageengine\setup.iss
|
Loading…
Reference in New Issue