Land #8372, rservice documentation
commit
8be51bb56b
|
@ -0,0 +1,62 @@
|
|||
## Vulnerable Application
|
||||
|
||||
The R Services (rexecd, rlogind, and rshd) are a suite of unencrypted remote command/login services developed in the 1980s.
|
||||
These services are all but unused in modern computing, as they have been replace by telnet and ssh.
|
||||
|
||||
The following was done on Kali linux:
|
||||
|
||||
1. `apt-get install rsh-server` which includes: `rexecd`, `rlogind` and `rshd`.
|
||||
2. Start the service: `service openbsd-inetd start`
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install and configure rexec
|
||||
2. Start msfconsole
|
||||
3. Do: `use auxiliary/scanner/rservices/rexec_login`
|
||||
4. Do: `set rhosts`
|
||||
5. Set any other credentials that will need to be set
|
||||
6. Do: `run`
|
||||
|
||||
## Scenarios
|
||||
|
||||
A run against the configuration from these docs
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/rservices/rexec_login
|
||||
msf auxiliary(rexec_login) > set username test
|
||||
username => test
|
||||
msf auxiliary(rexec_login) > set password 'test'
|
||||
password => test
|
||||
msf auxiliary(rexec_login) > run
|
||||
|
||||
[*] 127.0.0.1:512 - 127.0.0.1:512 - Starting rexec sweep
|
||||
[+] 127.0.0.1:512 - 127.0.0.1:512, rexec 'test' : 'test'
|
||||
[!] 127.0.0.1:512 - *** auxiliary/scanner/rservices/rexec_login is still calling the deprecated report_auth_info method! This needs to be updated!
|
||||
[!] 127.0.0.1:512 - *** For detailed information about LoginScanners and the Credentials objects see:
|
||||
[!] 127.0.0.1:512 - https://github.com/rapid7/metasploit-framework/wiki/Creating-Metasploit-Framework-LoginScanners
|
||||
[!] 127.0.0.1:512 - https://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-HTTP-LoginScanner-Module
|
||||
[!] 127.0.0.1:512 - *** For examples of modules converted to just report credentials without report_auth_info, see:
|
||||
[!] 127.0.0.1:512 - https://github.com/rapid7/metasploit-framework/pull/5376
|
||||
[!] 127.0.0.1:512 - https://github.com/rapid7/metasploit-framework/pull/5377
|
||||
[*] Command shell session 2 opened (127.0.0.1:37489 -> 127.0.0.1:512) at 2017-04-27 20:56:54 -0400
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
## Confirming using NMAP
|
||||
|
||||
Utilizing [rexec-brute](https://nmap.org/nsedoc/scripts/rexec-brute.html)
|
||||
|
||||
```
|
||||
nmap -p 512 --script rexec-brute 127.0.0.1
|
||||
|
||||
Starting Nmap 7.40 ( https://nmap.org ) at 2017-04-27 21:23 EDT
|
||||
Nmap scan report for localhost (127.0.0.1)
|
||||
Host is up (0.000037s latency).
|
||||
PORT STATE SERVICE
|
||||
512/tcp open exec
|
||||
| rexec-brute:
|
||||
| Accounts:
|
||||
| test:test - Valid credentials
|
||||
|_ Statistics: Performed 7085940 guesses in 629 seconds, average tps: 9231.6
|
||||
```
|
|
@ -0,0 +1,68 @@
|
|||
## Vulnerable Application
|
||||
|
||||
The R Services (rexecd, rlogind, and rshd) are a suite of unencrypted remote command/login services developed in the 1980s.
|
||||
These services are all but unused in modern computing, as they have been replace by telnet and ssh.
|
||||
|
||||
The following was done on Kali linux:
|
||||
|
||||
1. `apt-get install rsh-server` which includes: `rexecd`, `rlogind` and `rshd`.
|
||||
2. Start the service: `service openbsd-inetd start`
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install and configure rexec
|
||||
2. Start msfconsole
|
||||
3. Do: `use auxiliary/scanner/rservices/rlogin_login`
|
||||
4. Do: `set rhosts`
|
||||
5. Set any other credentials that will need to be set
|
||||
6. Do: `run`
|
||||
|
||||
## Scenarios
|
||||
|
||||
A run against the configuration from these docs
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/rservices/rlogin_login
|
||||
msf auxiliary(rlogin_login) > set rhosts 10.1.2.3
|
||||
rhosts => 10.1.2.3
|
||||
msf auxiliary(rlogin_login) > set password test
|
||||
password => test
|
||||
msf auxiliary(rlogin_login) > set username test
|
||||
username => test
|
||||
msf auxiliary(rlogin_login) > run
|
||||
|
||||
[*] 10.1.2.3:513 - 10.1.2.3:513 - Starting rlogin sweep
|
||||
[*] 10.1.2.3:513 - 10.1.2.3:513 - Attempting: 'test':"test" from 'root'
|
||||
[*] 10.1.2.3:513 - 10.1.2.3:513 - Prompt: Password:
|
||||
[*] 10.1.2.3:513 - 10.1.2.3:513 - Result: The programs included with the Kali GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Kali GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law.
|
||||
[+] 10.1.2.3:513 - 10.1.2.3:513, rlogin 'test' successful with password "test"
|
||||
[!] 10.1.2.3:513 - *** auxiliary/scanner/rservices/rlogin_login is still calling the deprecated report_auth_info method! This needs to be updated!
|
||||
[!] 10.1.2.3:513 - *** For detailed information about LoginScanners and the Credentials objects see:
|
||||
[!] 10.1.2.3:513 - https://github.com/rapid7/metasploit-framework/wiki/Creating-Metasploit-Framework-LoginScanners
|
||||
[!] 10.1.2.3:513 - https://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-HTTP-LoginScanner-Module
|
||||
[!] 10.1.2.3:513 - *** For examples of modules converted to just report credentials without report_auth_info, see:
|
||||
[!] 10.1.2.3:513 - https://github.com/rapid7/metasploit-framework/pull/5376
|
||||
[!] 10.1.2.3:513 - https://github.com/rapid7/metasploit-framework/pull/5377
|
||||
[*] Command shell session 1 opened (10.1.2.3:1023 -> 10.1.2.3:513) at 2017-05-11 20:04:24 -0400
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
## Confirming using NMAP
|
||||
|
||||
Utilizing [rlogin-brute](https://nmap.org/nsedoc/scripts/rlogin-brute.html)
|
||||
|
||||
```
|
||||
nmap -p 513 --script rlogin-brute 10.1.2.3
|
||||
|
||||
Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-11 20:07 EDT
|
||||
Nmap scan report for test (10.1.2.3)
|
||||
Host is up (0.000039s latency).
|
||||
PORT STATE SERVICE
|
||||
513/tcp open login
|
||||
| rlogin-brute:
|
||||
| Accounts: No valid accounts found
|
||||
|_ Statistics: Performed 6662201 guesses in 609 seconds, average tps: 10491.0
|
||||
|
||||
Nmap done: 1 IP address (1 host up) scanned in 608.75 seconds
|
||||
```
|
|
@ -0,0 +1,57 @@
|
|||
## Vulnerable Application
|
||||
|
||||
The R Services (rexecd, rlogind, and rshd) are a suite of unencrypted remote command/login services developed in the 1980s.
|
||||
These services are all but unused in modern computing, as they have been replace by telnet and ssh.
|
||||
|
||||
`rsh` relies on host names as a security mechanism. Utilizing `+` can wildcard so any computer can connect. In the following
|
||||
config, we'll utilize that wildcarded setting to simplify our exploitation. **This is a glaring security issue!!!**
|
||||
However, there are exceptions to this in proprietary Unix systems which may include other mechanisms such as Kerberos
|
||||
([AIX](https://www.ibm.com/support/knowledgecenter/en/ssw_aix_71/com.ibm.aix.cmds4/rsh.htm))
|
||||
|
||||
If you encounter `Host address mismatch for `..., you may need to adjust your `/etc/hosts` file accordingly.
|
||||
|
||||
The following was done on Kali linux:
|
||||
|
||||
1. `apt-get install rsh-server` which includes: `rexecd`, `rlogind` and `rshd`.
|
||||
2. ```echo "+" > ~/.rhosts```
|
||||
3. Start the service: `service openbsd-inetd start`
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Install and configure rexec
|
||||
2. Start msfconsole
|
||||
3. Do: `use auxiliary/scanner/rservices/rsh_login`
|
||||
4. Do: `set rhosts`
|
||||
5. Set any other credentials that will need to be set
|
||||
6. Do: `run`
|
||||
|
||||
## Scenarios
|
||||
|
||||
A run against the configuration from these docs
|
||||
|
||||
```
|
||||
msf > use auxiliary/scanner/rservices/rsh_login
|
||||
msf auxiliary(rsh_login) > set rhosts 10.1.2.3
|
||||
rhosts => 10.1.2.3
|
||||
msf auxiliary(rsh_login) > set username root
|
||||
username => root
|
||||
msf auxiliary(rsh_login) > run
|
||||
|
||||
[*] 10.1.2.3:514 - 10.1.2.3:514 - Starting rsh sweep
|
||||
[*] 10.1.2.3:514 - 10.1.2.3:514 - Attempting rsh with username 'root' from 'root'
|
||||
[+] 10.1.2.3:514 - 10.1.2.3:514, rsh 'root' from 'root' with no password.
|
||||
[!] 10.1.2.3:514 - *** auxiliary/scanner/rservices/rsh_login is still calling the deprecated report_auth_info method! This needs to be updated!
|
||||
[!] 10.1.2.3:514 - *** For detailed information about LoginScanners and the Credentials objects see:
|
||||
[!] 10.1.2.3:514 - https://github.com/rapid7/metasploit-framework/wiki/Creating-Metasploit-Framework-LoginScanners
|
||||
[!] 10.1.2.3:514 - https://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-HTTP-LoginScanner-Module
|
||||
[!] 10.1.2.3:514 - *** For examples of modules converted to just report credentials without report_auth_info, see:
|
||||
[!] 10.1.2.3:514 - https://github.com/rapid7/metasploit-framework/pull/5376
|
||||
[!] 10.1.2.3:514 - https://github.com/rapid7/metasploit-framework/pull/5377
|
||||
[*] Command shell session 1 opened (10.1.2.3:1023 -> 10.1.2.3:514) at 2017-05-11 19:56:46 -0400
|
||||
[*] Scanned 1 of 1 hosts (100% complete)
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
||||
## Confirming
|
||||
|
||||
At the time of writing this, there was no `nmap` script equivalent. Most modern systems have also replaced `rsh` with `ssh`.
|
Loading…
Reference in New Issue