Exploiting Desktop Central 9 with Metasploit

We saw in the previous section that we discovered ManageEngine's Desktop Central 9 software running on port 8022 of the server. Let's find a matching module in Metasploit to check whether we have any exploit module or an auxiliary module that can help us break into the application, as shown in the following screenshot:

Plenty of modules listed! Let's use the simplest one first, which is auxiliary/scanner/http/manageengine_desktop_central_login. This auxiliary module allows us to brute force credentials for Desktop Central. Let's put it to use by issuing a use command followed by auxiliary/scanner/http/manageengine_desktop_central_login ...

Get Metasploit Revealed: Secrets of the Expert Pentester now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.