Internal
Got elevated shell using publicly available exloit
Summary
The machine was running an old version of Microsoft Windows SMB server
used a publicaly avaialbe exploit to get a SYSTEM shell on the box
🧵Let's Unpack
Enumeration
sudo nmap --script smb-vuln* -p 139,445 -oN smb-vuln-scan 192.168.166.40
smb-vuln-cve2009-3103:
| VULNERABLE:
| SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
| State: VULNERABLE
| IDs: CVE:CVE-2009-3103
| Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2,
| Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a
| denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE
| PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location,
| aka "SMBv2 Negotiation Vulnerability."
|
| Disclosure date: 2009-09-08
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
|_ http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
As indicated by the Nmap scan, the SMB is vulnerable to CVE-2009-3103.
Initial Foothold (without Metasploit)
Using the following exploit to get a shell on the box
Last updated