From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock the full course today
Join today to access over 25,000 courses taught by industry experts.
Exploiting with Perl - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Exploiting with Perl
- GuildFTPd is a free to download third-party FTP server. And there's an exploit for it, written using Pearl. Let's check out exploit DB. Searchsploit, GuildFTP. Okay, we've got three vulnerabilities identified and two versions. Let's copy the last one, which is a Pearl exploit. Copy, slash, user, slash, share, slash, exploit DB, slash, exploits. And we want windows, remote, 8200 dot PL. And I'll just copy that into a 8200 dot PL. Okay, let's take a look. Nano 8200 dot PL. Okay, we can see an explanation of the exploits, which allows remote file deletion, with directory traversal outside the scope of the FTP root directory. We can see here, an example of the exploits usage. The exploit requires the server IP address and port, as well as credentials to enter the FTP server. It also requires of course, the file name of the file to delete. The exploit code makes a connection to the server, and then…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.