Monday, June 8, 2009
Windows SMB Relay Exploit
A live demonstration of obtaining admin access on a Windows XP SP3 Machine. Exploits a flaw in Windows Server Message Block (SMB) which provides shared access to files and folders on network. Hacker utilizes Metasploits Framework to run the exploit.It works by relaying a SMB authentication request to another host which provides Metasploit with a authenticated SMB session, and if the user is an administrator, Metasploits will be able to execute code on the target computer and can even get a reverse shell.Hacker forces the target computer to perform a SMB authentication attempt by using a Ettercap Filter.For authentication target computer is forwarded to Metasploit.
Labels:
Ettercap,
hacking,
MetaSploit,
Remote Attack,
Remote Exploit,
SMB Exploit
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment