Exercise : Scanning #2 Phpmyadmin BiluBox Penetration Test

Hi Everyone

Today I am going to continue the jorney of penetration test for Bilubox. At this point, I am going to explain the step of finding the exploitable bug based on the information we got fro the previous steps.

lets start from phpmyadmin application. We know that the version of phpmyadmin is 3.4.7.

The first thing to get exploit information is using searchploit here is the steps

  1. open the console in the kali linux
  2. type searchploit phpmyadmin and there will alot of collection of exploit regarding phpmyadmin. We can see there is one exploit that related to the phpmyadmin with version the same with ours.

output of searchploit phpmyadmin


one of exploit available for our phpmyadmin version


You can check the exploit detail description by typing searchploit -x exploits/php/webapps/18371.rb


after the above information we can see that the exploit successfully tested not at our version which is 3.4.2

We can try to gather exploit information from metasploit, it is very easy to be used and powerfull framework.

launch your metasploit framework and do the following

type search phpmyadmin


we can see from the above information that there are some exploit regarding phpmyadmin including the discolusure that give us when the exploit came out and it’s rank, the better the rank means the more possibilities the exploit will successfull. it is recommended to use the best “excellent” exploit for successfull attack.

You can go further down go to the detail of each exploit, for example you want to use exploit/multi/http/phpmyadmin_null_termination_exec then you can type like the below in the metasploit

use exploit/multi/http/phpmyadmin_null_termination_exec

show options

I will give the detail on how to use metasploit in the different post.

The one that you should not forget is to look the information on google regarding the vulnerability also check on gihub.

as we can see the detail, most of the exploit requires phpmyadmin authentication to do successfull attack. but in this phase we do not have it yet. To reduce the time taken, lets put aside phpmyadmin exploitation for a while an we go forward to another alternative

I will do the credential hunting in the other post. 🙂

One comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s