module

Zemra Botnet CnC Web Panel Remote Code Execution

Disclosed
2012-06-28
Created
2018-05-30

Description

This module exploits the CnC web panel of Zemra Botnet which contains a backdoor
inside its leaked source code. Zemra is a crimeware bot that can be used to
conduct DDoS attacks and is detected by Symantec as Backdoor.Zemra.

Authors

Jay Turla @shipcod3
Angel Injection
Darren Martyn @info_dox

Platform

Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/zemra_panel_rce
msf exploit(zemra_panel_rce) > show targets
...targets...
msf exploit(zemra_panel_rce) > set TARGET < target-id >
msf exploit(zemra_panel_rce) > show options
...show and set options...
msf exploit(zemra_panel_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.