Exploitation

The exploitation of ClamAV service was done through the enumeration of the SNMP Service using snmp-check.

Note the service that is running. ClamAV by Milter

Quick use of exploit.db

On line 18, we see the output of the exploit opened up a port on 31337 and it opened a shell as root.

Last updated