Critical System Protection

 View Only

Microsoft Server Service Relative Path Stack Corruption Exploitation and Prevention part-i 

Jan 04, 2012 01:55 PM

I am writing this Article into 2 Parts. In 1st part I am explaning the procedure of exploitation of Microsoft Server Service Relative Path Stack Corruption (smb_ms08_067_netapi) and in 2nd Part i will show you how to prevent exploitation of Microsoft Server Service Relative Path Stack Corruption with Symantec Critical System Protection (SCSP).


Exploitation of Microsoft Server Service Relative Path Stack Corruption Vulnerability in Windows (smb_ms08_067_netapi)

It exploits a parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service. This module is capable of bypassing NX on some operating system and service packs. The correct target must be used to prevent the Server Service ( along with a dozen others in the same process) from crashing. Windows Xp targets seem to handle multipe successful exploitation events, but 2003 targets will often crash or hang on subsequent attempts.

So lets start with exploitation of Microsoft Server Service Relative Path Stack Corruption (smb_ms08_067_netapi).

1) I am using Unpatched Windows XP Professional SP2 and its IP address is 192.168.42.71 (Victim Machine).

 

2) I am using Metasploit Framework Community Edition for exploitation (Attacker Machine).

3) I am using ms08_067_netapi exploit i.e. windows/smb/ms08_067_netapi.

 

4) Now i have to enter the IP Address of my victim machine.

5) I am using windows/meterpreter/reverse_tcp payload.

6) Now i have to enter the IP Address of Attacker Machine.

7) Now Write Exploit and hit Enter and here we got the meterpreter Shell.

 

8) Now i want the Cmd Shell of Victim Machine. So i write Shell and Hit Enter.

 

9) Now check the IP Address of Victim Machine with Ipconfig Command. It shows IP address is 192.168.42.71. It means we succesfully exploit this vulnerability and got meterpreter shell.

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.