Legacy

Legacy - 10.10.10.4

Target Enumeration:

OS: Windows
IP: 10.10.10.4
User: e69af0e4f443de7e36876fda4ec7644f
Root: 993442d258b0e0ec917cae9e695d5713

Ports / Services / Software Versions Running

1
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
2
445/tcp open microsoft-ds Windows XP microsoft-ds
3
3389/tcp closed ms-wbt-server
Copied!

Vulnerability Exploited:

MS08-067
This exploits a parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service. This module is capable of bypassing NX on some operating systems and service packs. The correct target must be used to prevent the Server Service (along with a dozen others in the same process) from crashing. Windows XP targets seem to handle multiple successful exploitation events, but 2003 targets will often crash or hang on subsequent attempts.

Exploiting the host:

Nmap
Nmap SMB-Vuln scan:
Set msfconsole as follows:
Execute the exploit and get meterpreter shell.
Evidence
Last modified 2yr ago