10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

114 CHAPTER 5 <strong>Power</strong>ing The Deck<br />

EXPLOITING VULNERABILITIES<br />

The Windows XP machine at 192.168.10.103 has two high-priority security holes.<br />

One of these holes is related to a possible denial of service attack known as jolt2.<br />

Given that this machine is not a server, this is not necessarily as concerning as it first<br />

sounds. The other high-priority hole indicates a vulnerability related to file sharing<br />

<strong>with</strong> the Server Message Block (SMB) protocol.<br />

The Metasploit framework can be used to attempt to exploit this vulnerability.<br />

Firing up the Metasploit console is a simple as becoming root, changing to the appropriate<br />

directory, <strong>and</strong> running msfconsole. The initial welcome banner is shown in<br />

Figure 5.16.<br />

Exploiting the SMB security hole is as simple as loading the exploit, setting<br />

parameters including a payload, <strong>and</strong> then running the exploit. The comm<strong>and</strong> to load<br />

our desired exploit is use exploit/windows/smb/ms08_067_netapi. Note that tab<br />

completion is available in Metasploit if you cannot remember the exact name of a<br />

module or comm<strong>and</strong>. The Metasploit console prompt changes to reflect the currently<br />

loaded module.<br />

FIGURE 5.16<br />

Initial Metasploit console welcome banner.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!