windowsInternal

Got elevated shell using publicly available exloit

Summary

  • The machine was running an old version of Microsoft Windows SMB server

  • used a publicaly avaialbe exploit to get a SYSTEM shell on the box

🧵Let's Unpack

Enumeration

sudo nmap --script smb-vuln* -p 139,445 -oN smb-vuln-scan 192.168.166.40

smb-vuln-cve2009-3103: 
|   VULNERABLE:
|   SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
|     State: VULNERABLE
|     IDs:  CVE:CVE-2009-3103
|           Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2,
|           Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a
|           denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE
|           PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location,
|           aka "SMBv2 Negotiation Vulnerability."
|           
|     Disclosure date: 2009-09-08
|     References:
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
|_      http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103

As indicated by the Nmap scan, the SMB is vulnerable to CVE-2009-3103.

Initial Foothold (without Metasploit)

Using the following exploit to get a shell on the box

chevron-rightExploit that worked!hashtag

Last updated