Project 1 ‐ Vulnerability Research (Zabbix) - FlameSpyro/Tech-Journal GitHub Wiki
Project 1 - Vulnerability Research (Zabbix)
Notice: My research and attempt looking and exploiting the Zabbix Server has been unsuccessful in completing. This guide will explain the installation process in installing Zabbix newest version and the exploit running.
Open mysql which was installed with the packages and create a user Zabbix alongise a password of choice:
mysql -uroot -p
password
mysql> create database zabbix character set utf8 collate utf8_bin;
mysql> create user zabbix@localhost identified by 'password';
mysql> grant all privileges on zabbix.* to zabbix@localhost;
mysql> set global log_bin_trust_function_creators = 1;
mysql> quit;
Host import initial schema and data. This also prompts the creation of a new password
zcat /usr/share/doc/zabbix-server-mysql*/create.sql.gz | mysql -uzabbix -p zabbix
Disable log_bin_trust_function_creators option.
mysql -uroot -p
password
mysql> set global log_bin_trust_function_creators = 0;
mysql> quit;
Edit the /etc/zabbix/zabbix_server.conf to add a password for the zabbix user
sudo nano /etc/zabbix/zabbix_server.conf
# Uncomment near DBUser
DBPassword=password
Edit the /etc/zabbix/apache.conf and select a proper timezone