Two strokes to fill Windows 2003 DNS server vulnerabilities

Source: Internet
Author: User
Tags command line connect advantage

DNS is the abbreviation for the domain Name System. Everyone in the Internet input URL, is through the domain name resolution system to find the corresponding IP address to access the site. But the recent Microsoft Windows 2000 and Windows 2003 DNS services have a very high security vulnerabilities, if hackers successfully exploited, then our internet operation will encounter great trouble.

Hacking expertise: Windows System Vulnerability Research

Using tools: DNS Server Vulnerability Utilization tool

Hacker confessions: There has been a 0day vulnerability in the recent DNS of Windows systems, and since the code for this vulnerability has been disclosed, various variants of the Nirbot worm attacking the vulnerability have emerged. If the vulnerability is exploited by hackers, the system will be fully controlled by the hacker.

DNS Vulnerabilities Open System defenses

If this vulnerability exists in Windows DNS, if it is working, the RPC interface will release administrator privileges if it is processed to an unconventional malformed connection request, allowing the hacker to take advantage of the vulnerability to fully control the system. By sending a specially designed RPC packet to a system with this vulnerability, the hacker can obtain administrator privileges on the system and remotely execute arbitrary instructions.

Little knowledge: What is RPC

Remote Procedure Call (RPC) is a protocol that a program can use to request services from a program on another computer in the network. Because a program that uses RPC does not have to understand the circumstances of the network protocol that supports communication, RPC enhances the interoperability of the program.

Earlier, there were several vulnerabilities in RPC, including the one that caused the Blaster worm to explode. This latest vulnerability is a stack overflow vulnerability that poses a lot of trouble to Microsoft and Windows users.

Windows XP and Windows Vista are not affected by this DNS vulnerability, according to Microsoft releases, Windows Server SP4, Windows Server 2003 SP1, Windows Server 2003 SP2 There is a loophole.

Easy access to DNS vulnerabilities

Open the system's command prompt, and then jump to the DNS server to exploit the command that is in the tool, and then execute the exploit tool (Figure 1).

Execute the command in the exploit of the vulnerability: dns.exe-h 127.0.0.1-t 1-p 445, because I tested it on the local computer, so the IP address is 127.0 0.1, and I need to set the parameters according to the server version of the language. After successful use of the ToolTip overflow, you can use the Telnet command or program NC to connect to port 4444 in the vulnerable server, such as Telnet 127.0.0.1 4444 (Figure 2). It should be explained that the success rate of the tool is not particularly high, so it takes a few more times to test

When we successfully exploited the vulnerability to overflow, we can enter: NET user PCW 1234/add at the command line, and if the display command succeeds after the carriage return is confirmed, a user named PCW password 1234 has been successfully added.

Then we enter: net localgroup Administrators pcw/add at the command line, and the successful execution means that the user has been added to the Administrators group (Figure 3).

Now, just take advantage of the remote desktop features of the Windows system, then connect to the IP address of the DNS server, and then log in with the username we just created, and then we can do the proper remote management operation (Figure 4).

If the remote server does not open Terminal Services function, you can also through the overflow Command Prompt window, through FTP or TFTP command upload our Trojan, this can also be effective remote management operations.

The loophole is very harmful, we should prevent

Because this security vulnerability affects Windows Server and Windows Server 2003 Server software, there is a patch for each language version of Windows servers. Microsoft provided the patch address: http://www.microsoft.com/china/technet/security/bulletin/ms07-029.mspx, please choose the corresponding patch according to their own situation.

At the same time, administrators are advised to take the following steps to reduce the threat. First Open Registry Editor, locate the following registry location Hkey_local_machinesystemcurrentcontrolsetservicesdnsparameters, and create a new name named "RpcProtocol" via the right-click menu DWORD project, and then double-click the new value and change the value's data to 4, and then restart the DNS service changes to take effect.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.