![]() ![]() Searchsploit unreal ircd 3.2.8.1 A few direct hits from searchsploit.Īs we already expected there are 3 direct hits for this version of Unreal IRCd: Let’s start searching Searchsploit for an exact match using the following command: ![]() Unreal IRCD 3.2.8.1 vulnerability assessmentīefore we will be hacking Unreal IRCd we need to check this version of Unreal IRCD for vulnerabilities using searchsploit on Kali Linux and exploit-db. Let’s feed this information to searchsploit and exploit-db to see if this version of Unreal IRC is vulnerable and how we can exploit it. We can use this information to perform a vulnerability assessment and see how we can exploit this service. As you can see the version is Unreal 3.2.8.1. The hostname, some configuration information and what we were looking for: the version number of the Unreal IRC service. When all of the supplied information is correct HexChat will connect to the Unreal IRC service as following:Ī lot of information is presented to us when we enter the IRC channel. Next click on the Edit button and enter the Metasploitable 2 IP address for the new network and use port 6667 as following: Click edit to specify the IP and port divided by a slash sign.Ĭlose the windows and click on the connect button to connect to the IRC service on Metasploitable 2. Click the add button and name the new network Metasploitable 2: Click on the add button to add a new network and name it Metasploitable 2. Then we start HexChat add a new network with the Metasploitable 2 IP. If you don’t have an IRC client installed on your Kali Linux you can install Hexchat by using the following command: Let’s start with connecting to the IRCd service and see if we can find more detailed information about this service. When we know which version of Unreal IRCd we are dealing with, we can continue with performing a vulnerability assessment. Then we will be exploiting the found vulnerabilities both manual and by using the Metasploit framework.įrom the Metasploitable enumeration tutorial we got the following information from Nmap: Hacking Unreal IRCd: 2 open ports for Unreal IRCd: 66 Connecting to the IRC Server with HexChat Such as the version number for example which could not be retrieved with Nmap. Then we will be looking at how to perform code analysis and modify payloads using msfvenom before we execute the exploit. In order to retrieve more information about the Unreal IRCd service we need to connect to the IRC channel using an IRC client. We will start with installing the HexChat IRC client and connect to the IRC channel to see if we can get more information about this service. We will learn how to perform enumeration on network services and how to define and retrieve crucial information. In this tutorial we will be hacking Unreal IRCd service on Metasploitable 2. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |