🔬SMB - PsExec
Last updated
Was this helpful?
Last updated
Was this helpful?
🔬
Target IP:
10.4.16.36
SMB exploitation
Dictionaries to use:
/usr/share/metasploit-framework/data/wordlists/common_users.txt
/usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
📌 SMB version 2.02
The brute force success is based on the users and password used.
Using this technique, no exploit is launched or uploaded on the target system.
It is a legitimate authentication with the actual credentials and the use of an official tool (psexec
).
This technique will upload and run a (malicious) payload on the target. Pay attention to the antivirus!
Find the flag, running meterpreter
commands
🔬 Home Lab
I have prepared a vulnerable Windows 2008 R2 Virtual Machine and connected it to the same network of the Kali virtual machine. On the server, I have activated
File Services
role and created a shared folder with the Administrators Group.
Host system:
Kali Linux
Target system:
Windown Server 2008 R2
- IP192.168.31.131
-Administrator
:Eternal17010
📌 The system is vulnerable to the
CVE-2017-0143
Generate a shellcode that will be exploited on the target system.
Set a netcat
listener on the specified port, in another terminal tab
In the AutoBlue
terminal tab, use the eternalblue_exploit7.py
to exploit the target from the AutoBlue-MS17-010 directory
Check the netcat
tab for the reverse shell
Use Metasploit module to brute force SMB
Use script for Linux (from the ) to get a command prompt on the target machine, with the Administrator account.
Alternatively to the Python script, use Metasploit module to get a meterpreter
session on the target system.
Exploitation tool:
Vulnerability: +
will be used for the manual exploitation