Infiltration experiment based on ms08-067 loophole under backtrack

Source: Internet
Author: User
Tags command line firewall

(1). MS08067 Vulnerability Description

ms08-067 vulnerabilities are all called "Windows Server service RPC request buffer overflow vulnerabilities".

If a user receives a specially crafted RPC request on an affected system, the vulnerability could allow remote code execution.

On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems,

An attacker could exploit this vulnerability without authentication to run arbitrary code that could be used for worm attacks.

There is already a worm that exploits this vulnerability. Firewall best practices and standard default firewall configuration

Helps protect network resources from attacks originating outside the enterprise, and by default it establishes an empty connection.

(2) exploit of the loophole

This experiment in the LAN experiment, obtain the computer owner's consent to only carry out the test. The target system is Windows Server 2003.

First, you need to collect information about your goals. Using the Nmap Scan Tool, Nmap is a powerful scanning tool that detects dangerous vulnerabilities on the target.

We called the Nmap plug-in--script=smb-check-vulns in the Metasploit. Scan parameters:-ss refers to the secret TCP SYN scan (-st is a stealth TCP connection scan, with this parameter to enumerate the most reliable port),-A is the advanced system detection function, the hint to a specific service for a deeper flag and fingerprint grab, can provide us with more information.

The results of the NAMAP Scan report found ms08-067:vulnerable. This is a hint that we might be able to penetrate the host, then we found the attack module of the vulnerability in Metasloit and tried to attack the target machine. Ms08-067 is a very high vulnerability to the operating system version, so here we just need to manually specify the target to ensure that the correct overflow code is triggered.

Using Windows ms80067 Vulnerability, set the attack load, here the bounce command line shell as the attack load, this payload after the successful attack, will launch a rebound from the target host connection to the Lhost IP address, This bounce-back connection allows you to bypass inbound traffic protection from the incoming firewall or penetrate the Nat gateway.

Set remote target and local listening IP address, execute overflow after the attack parameter configuration is complete

This column more highlights: http://www.bianceng.cnhttp://www.bianceng.cn/Network/Security/

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.