19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 11-11:<br />

Exploitable<br />

vulnerability<br />

found by<br />

Qualys-<br />

Guard.<br />

Chapter 11: Windows<br />

Before you go ’sploitin’ vulnerabilities with Metasploit, it’s very important to<br />

know that you’re venturing into sensitive territory. Not only can you gain full,<br />

unauthorized access to sensitive systems, but you can also put the systems<br />

being tested into a state where they can hang or reboot. So, read each<br />

exploit’s documentation and proceed with caution.<br />

Before you can exploit a missing patch or related vulnerability, you have to<br />

find out what’s available for exploitation. The best way to go about doing this<br />

is to use a tool such as QualysGuard or LanGuard to find them. I’ve found<br />

QualysGuard to be very good at rooting out such vulnerabilities even as an<br />

unauthenticated user on the network. Figure 11-11 shows QualysGuard scan<br />

results of a Windows server system that has the nasty Windows Plug and<br />

Play Remote Code Execution vulnerability that I still see quite often.<br />

Using Metasploit<br />

After you find a vulnerability, the next step is to exploit it. In this example, I<br />

use Metasploit (an open source tool owned by Rapid7) and obtain a remote<br />

command prompt on the vulnerable server. Here’s how:<br />

217

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!