Development Of Metasploit Module After 0day [Nuuo NVRmini2 RCE]
Hello Everyone
In this article I will tell you how to develop a 0day's metasploit module. Before writing Thank you to Numan Türle (@numanturle) for help on about ruby on rails
Vulnerability
If we need to summarize the first picture, we mentioned that the msf module is remote and we will use http client.
Then enter the author, platforms, date and arch values. There is a point we need to pay attention to here.People often compare "remote code execution" and "remote command execution" vulnerabilities.If this vulnerability was remote code execution, we should have chosen ARCH_PHP.
"if else" loop generated in response to code in first lines. If response 200 and body / upload_tmp_dir / return vulnerable.
In the last lines we have specified the type of web request to be made "GET". Then the payload is entered with the "cmd" to the value that is the vulnerability. This payload gets backconnect with telnet.
Thank you for reading. twitter.com/berkdusunur
mailto::berkdusunurx@protonmail.com