Re: escalating IUSR to admin rights via unicode and iis4

From: Bill Pennington (billp@boarder.org)
Date: Thu Jul 11 2002 - 13:18:31 EDT


What I have done in the past is get a copy of hk.exe. It is a local
privilege escalation exploit that runs processes as SYSTEM.

Then just run netcat via hk.exe, connect to the listener, and bingo you
are SYSTEM.

It has been a while since I have done this so I don't recall the exact
syntax but that should get you pointed in the right direction.

On Tuesday, July 9, 2002, at 10:18 AM, ewvtwvi@hushmail.com wrote:

>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hello,
>
> I understand that this topic has been discussed in great deal, however
> i searched the archives and was unable to find anything.
>
> In doing a security assessment - I came across a web server running
> iis4 that is vulnerable to the unicode exploit. I was able to get it to
> tftp back to my tftp server and pull down nc and a few other
> things...then got nc listening with a shell and was able to connect to
> that shell...I didnt go any further and reported it as it was. I was
> then questioned on the possibility of it being used to escalate rights
> to administrator..and asked for a demo... i repeated the above steps,
> but was unable to stop services and such. I couldnt even delete a file
> I had uploaded using unicode with tftp.
> Could someone please point me to info that would explain what i have
> to do to
> accomplish this. I have been searching...but apparently not well enough.
>
> Again, I hope this gets through..As it has prolly been discussed very
> much. I apologize in advance for this question.. but im stuck :(
>
> Thanks much!
> t
> -----BEGIN PGP SIGNATURE-----
> Version: Hush 2.1
> Note: This signature can be verified at https://www.hushtools.com
>
> wlwEARECABwFAj0rGdkVHGV3dnR3dmlAaHVzaG1haWwuY29tAAoJEONDjIN5eMWV4yoA
> n1TdHlIf1vT//ZWzA/D9CaPaVC7bAKCyKMk5UUB8wzny2LtRDKWQNepzFw==
> =yH9p
> -----END PGP SIGNATURE-----
>
>
> Communicate in total privacy.
> Get your free encrypted email at https://www.hushmail.com/?l=2
>
> Looking for a good deal on a domain name?
> http://www.hush.com/partners/offers.cgi?id=domainpeople
>
>
> ----------------------------------------------------------------------------
> This list is provided by the SecurityFocus Security Intelligence Alert
> (SIA)
> Service. For more information on SecurityFocus' SIA service which
> automatically alerts you to the latest security vulnerabilities please
> see:
> https://alerts.securityfocus.com/
>

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:23 EDT