Skip to content

BlackMathIT/Esteemaudit-Metasploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

51 Commits
 
 
 
 
 
 

Repository files navigation

Esteemaudit-Metasploit

This is a porting of the infamous Esteemaudit RDP Exploit leaked from Equationgroup (NSA). The vulnerability exploited by this attack is related to Smart Card authentication, used when logging onto the system via the RDP service. Systems affected are Windows Server 2003 SP1,SP2 and Windows XP SP0, SP1, SP3.

Dependencies:

  • dpkg --add-architecture i386
  • apt-get update && apt-get install wine32

How to do:

  • Copy the esteemaudit.rb on the right Metasploit folder (e.g. /usr/share/metasploit-framework/modules/exploits/windows/rdp/)
  • Copy only the content of "files" folder on /usr/share/esteemaudit/
  • wine /usr/share/esteemaudit/Esteemaudit-2.1.0.exe 2>0
    (This is just to create Wine32 environment, skip it if you already have /root/.wine/drive_c/)

WE ARE NOT RESPONSIBLE OF ANY DAMAGES CAUSED BY THE USE OF THIS PORTING. IT WAS MADE FOR EDUCATIONAL PURPOSE AND TESTING ONLY!

Microsoft released a Patch

https://support.microsoft.com/en-us/help/4025687/microsoft-security-advisory-4025685-guidance-for-older-platforms

How to mitigate via GPO

Windows server 2003 and XP:

  • Run gpedit.msc
  • Go to Computer Configuration\Administrative Templates\Windows Components\Terminal Services\Client/Server data redirection\
  • Set enable on "Do not allow Smart Card device redirection"
  • Restart the server.

alt text

www.blackmath.it | info@blackmath.it

About

Porting for Metasploit of the infamous Esteemaudit RDP Exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published