4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code Execution No comments: After very long times I didn't write about hacking webserver, today "again" when surfing around I've found that Jcow Social networking engine can be exploited and the exploit ranking marked as "excellent".So actually, what happen when you have this Jcow vulnerable version??The simple thing is the attacker can go through your web server directory and doing everything there. For example, if you hosting your Jcowvulnerable version(on insecure hosting also ) you can own your web server directory.In this example, let's say I have a Jcow vulnerable web server in IP address 192.168.8.94. Actually, it's better to try installing your own web server, but if you want to find out Jcow in the wild you can search through Google dork "intext: Powered by Jcow 4.2.0" and register as the normal user there. In this tutorial I have already registered as username: victim and password also victim Okay, I hope you understand what I say above to make it more realistic, let's try the tutorial…4 Steps Hacking Jcow Social Networking Web Server via Arbitrary Code ExecutionLevel: MediumVictim Server: work fine if victim uses Windows XP SP3Victim vulnerable application: JCow 4.2Attacker O.S: obviously you need Backtrack 5 R1Requirement :Here only you need bellow two item.Which is your actual need.1#. Metasploit framework2.# Jcow.rb exploit mediafire.comNow lets start this article.4 Steps Hacking Jcow Social Networking Web Server via ArbitraryCode Execution Process:1.#, first of all, you simply Copy the downloaded cow.rb exploit from the download link above and copy it into /pentest/exploits/framework/modules/exploits/remote/ folder(for example see the command below).cp jcow.rb /pentest/exploits/framework/modules/exploits/remote/now you see the text "framework" in blue color it's only because I'm using Backtrack 5 R1 and using Metasploit v4.0.1, so the name depended on your Metasploit version, maybe on your the computer can be "framework3" or "framework2" so on..so don't haveconfused.2.# now when you copy successfully after that, simply Open your Metasploit console and then use the exploit you just added before see bellow msf > use exploit/remote/jcow3.# now when you complete step 2, The next step we need to view the available switch for this exploit by running the show options command, and then configured it(see the text with red color).msf exploit(jcow) > set rhost 192.168.8.94 --> set the target IPrhost => 192.168.8.94msf exploit(jcow) > set username victim --> set the usernameusername => victimmsf exploit(jcow) > set password victim --> set the passwordpassword => victimmsf exploit(jcow) > set uri jcow --> only if jcow not in/directory fill it hereuri => jcowImportent:::?Set URI can be used if cow was not installed on web server main directory, for example http://web-server.com/jcow.4#. now your work has been almost done , After everything was set up successfully, the next thing to do was exploiting or running the exploit by using exploit command. After very long times I didn't write about hacking webserver, today "again" when surfing around I've found that Jcow Soci... View Post