Add ManageEngine Desktop Central Vuln to Metasploitable3

This commit is contained in:
wchen-r7 2016-10-21 18:28:21 -05:00
parent 26da533c99
commit 26545cbd68
5 changed files with 56 additions and 3 deletions

8
Vagrantfile vendored
View File

@ -24,8 +24,8 @@ Vagrant.configure("2") do |config|
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
# Add users and add to groups
config.vm.provision :shell, path: "scripts/configs/create_users.bat"
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
#config.vm.provision :shell, path: "scripts/configs/create_users.bat"
#config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
# Vulnerability - Unpatched IIS and FTP
config.vm.provision :shell, path: "scripts/installs/setup_iis.bat"
@ -88,6 +88,10 @@ Vagrant.configure("2") do |config|
config.vm.provision :shell, path: "scripts/installs/setup_mysql.bat"
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
# Vulnerability - ManageEngine Desktop Central
config.vm.provision :shell, path: "scripts/installs/install_manageengine.bat"
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
# Vulnerability - Axis2
config.vm.provision :shell, path: "scripts/installs/setup_axis2.bat"
config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614

Binary file not shown.

View File

@ -0,0 +1,44 @@
[InstallShield Silent]
Version=v7.00
File=Response File
[File Transfer]
OverwrittenReadOnly=NoToAll
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-DlgOrder]
Dlg0={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdWelcome-0
Count=9
Dlg1={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdLicense-0
Dlg2={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdAskDestPath-0
Dlg3={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-MessageBox-0
Dlg4={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-AskText-0
Dlg5={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdSelectFolder-0
Dlg6={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdStartCopy-0
Dlg7={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdShowMailPanel-20319
Dlg8={BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdFinish-0
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdWelcome-0]
Result=1
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdLicense-0]
Result=1
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdAskDestPath-0]
szDir=C:\ManageEngine
Result=1
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-MessageBox-0]
Result=1
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-AskText-0]
szText=8020
Result=1
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdSelectFolder-0]
szFolder=ManageEngine Desktop Central
Result=1
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdStartCopy-0]
Result=1
[Application]
Name=ManageEngine Desktop Central
Version=9.0.0
Company=ZOHO Corp
Lang=0409
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdShowMailPanel-20319]
Result=1
[{BCEF6F6B-E530-4D5E-8DB7-C54F96DB9D2A}-SdFinish-0]
Result=1
bOpt1=0
bOpt2=1

View File

@ -1,4 +1,4 @@
netsh advfirewall firewall add rule name="Open Port 8383 for Jenkins" dir=in action=allow protocol=TCP localport=8383
netsh advfirewall firewall add rule name="Open Port 8484 for Jenkins" dir=in action=allow protocol=TCP localport=8484
netsh advfirewall firewall add rule name="Open Port 5985 for WinRM" dir=in action=allow protocol=TCP localport=5985
netsh advfirewall firewall add rule name="Open Port 8282 for Apache Struts" dir=in action=allow protocol=TCP localport=8282
netsh advfirewall firewall add rule name="Open Port 80 for IIS" dir=in action=allow protocol=TCP localport=80
@ -9,3 +9,6 @@ netsh advfirewall firewall add rule name="Open Port 8585 for Wordpress and phpMy
netsh advfirewall firewall add rule name="Java 1.6 java.exe" dir=in action=allow program="C:\openjdk6\openjdk-1.6.0-unofficial-b27-windows-amd64\jre\bin\java.exe" enable=yes
netsh advfirewall firewall add rule name="Open Port 3000 for Rails Server" dir=in action=allow protocol=TCP localport=3000
netsh advfirewall firewall add rule name="Open Port 3306 for MySQL" dir=in action=allow protocol=TCP localport=3306
netsh advfirewall firewall add rule name="Open Port 8020 for ManageEngine Desktop Central" dir=in action=allow protocol=TCP localport=8020
netsh advfirewall firewall add rule name="Open Port 8383 for ManageEngine Desktop Central" dir=in action=allow protocol=TCP localport=8383
netsh advfirewall firewall add rule name="Open Port 8022 for ManageEngine Desktop Central" dir=in action=allow protocol=TCP localport=8022

View File

@ -0,0 +1,2 @@
powershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://archives.manageengine.com/desktop-central/91084/ManageEngine_DesktopCentral.exe', 'C:\Windows\Temp\ManageEngine_DesktopCentral.exe')" <NUL
start /WAIT C:\Windows\Temp\ManageEngine_DesktopCentral.exe /w /s /f1C:\Vagrant\resources\manageengine\setup.iss