Author: Havok Project URL: ViciDial Exploit Suite
The ViciDial Exploit Suite is a comprehensive toolset designed for penetration testers and security researchers targeting vulnerabilities in ViciDial installations. This suite leverages SQL Injection (SQLi) and Remote Code Execution (RCE) vulnerabilities to gain unauthorized access and execute commands. Additionally, the tool allows interaction with the ViciDial API for post-exploitation control after acquiring valid credentials.
- SQL Injection (SQLi): Extract administrative credentials via time-based SQLi attacks.
- Remote Code Execution (RCE): Execute remote shell commands on compromised ViciDial systems, with reverse shell capability.
- ViciDial API Integration: Authenticate to the ViciDial API using the extracted credentials, allowing further system control.
The SQL Injection module exploits time-based SQLi to extract sensitive data, such as admin usernames and passwords. It works by enumerating credentials one character at a time, providing live feedback during the extraction process.
- [+] Target appears vulnerable to time-based SQL injection.
- [-] Enumerating administrator credentials...
- [-] Username: admin
- [*] Password: Test@123
- [+] SQLi successful:
- [+]Username: admin, Password: Test@123
The RCE module enables remote shell command execution on the compromised ViciDial server. It can also be used to launch a reverse shell, allowing full access to the server for post-exploitation activities.
After obtaining administrative credentials, the tool provides direct interaction with the ViciDial API. This allows users to:
- List campaigns
- Make API calls
- Retrieve server information
- (Maybe more will be added later)
To set up the ViciDial Exploit Suite, follow these steps:
-
Clone the repository:
git clone https://github.com/havokzero/ViciDial.git cd ViciDial
-
Install the required dependencies:
Ensure
pip
is installed and run:pip install -r requirements.txt
-
Run the tool:
python main.py
Once launched, the tool presents you with a menu where you can choose between SQLi, RCE, or API functionalities:
- Select
[1]
for SQL Injection. - Provide the target ViciDial server URL.
- Watch as the tool extracts admin credentials through time-based SQLi.
- Select
[2]
for Remote Code Execution. - Provide details such as the webserver host, port, and listener configuration.
- Choose whether to launch a reverse shell or execute a command.
- Once credentials are obtained, select
[3]
to use the Vicidial API. - You can retrieve server information, list campaigns, or initiate calls.
-
Run the tool:
python main.py
-
Choose the SQL Injection option (Option 1).
-
Enter the ViciDial server URL.
-
Once credentials are retrieved, select the API option (Option 3) to interact with the system.
-
Run the tool:
python main.py
-
Select the RCE option (Option 2).
-
Provide the necessary webserver and listener details to launch a reverse shell or execute a command.
This tool is untested and intended for educational purposes only. The author is not responsible for any misuse of this software. Always ensure that you have explicit permission before running this tool on any systems.
This project is licensed under the MIT License. See the LICENSE file for details.