Computersecuritystudent Com
Computersecuritystudent Com
(Metasploit: MS12-020)
{ Kali 1.0: RDP Windows Exploit, Set Memory Crash Dump File } Help ComputerSecurityStudent
pay for continued research,
resources & bandwidth
3. What is Metasploit?
The Metasploit Framework is a open source penetration tool used for developing and executing
exploit code against a remote target machine it, Metasploit frame work has the world's largest
database of public, tested exploits. In simple words, Metasploit can be used to test the
Vulnerability of computer systems in order to protect them and on the other hand it can also be
used to break into remote systems.
4. What is BlueScreenView?
BlueScreenView scans all your minidump files created during 'blue screen of death' crashes,
and displays the information about all crashes in one table. For each crash, BlueScreenView
displays the minidump filename, the date/time of the crash, the basic crash information
displayed in the blue screen (Bug Check Code and 4 parameters), and the details of the driver
or module that possibly caused the crash (filename, product name, file description, and file
version).
Reference: http://nirsoft.net/utils/blue_screen_view.html
5. Pre-Requisite Lab
1. Kali: Lesson 1: Installing Kali 1.0
2. Damn Vulnerable Windows 7: Lesson 1: How to create a Damn Vulnerable Windows
7 Machine
6. Lab Notes
In this lab we will do the following:
1. Lower Windows 7 Memory
2. Configure Complete Crash Dump File
3. Illustrate Exploit
4. Post Cleanup Windows Machine
5. Add and Configure 5 GB Virtual Hard Disk
6. Install BlueScreenView
7. Legal Disclaimer
As a condition of your use of this Web site, you warrant to computersecuritystudent.com
that you will not use this Web site for any purpose that is unlawful or that is prohibited
by these terms, conditions, and notices.
In accordance with UCC § 2-316, this product is provided with "no warranties, either
express or implied." The information contained is provided "as-is", with "no guarantee of
merchantability."
In addition, this is a teaching website that does not condone malicious behavior of any
kind.
You are on notice, that continuing and/or using this lab outside your "own" test
environment is considered malicious and is against the law.
© 2016 No content replication of any kind is allowed without express written permission.
3. Configure CD/DVE(IDE)
Instructions:
1. Select CD/DVD (IDE)
2. Click on the Use physical drive: radio button
3. Select Auto detect
Note(FYI):
1. Do not click on the OK Button
4. Configure Memory
Instructions:
1. Select Memory
2. Click on "512 MB"
Note(FYI):
Temporarily lower the amount of memory to 512 MB to limit the size of the crash dump
file that we will later analyze in a proceeding lesson.
5. Configure Network Adapter
Instructions:
1. Select Network Adapter
2. Click the radio button "NAT: Used to share the host's IP address"
3. Click the OK button
Note(FYI):
1. We will use NAT instead of bridged, because of multiple VMware Player issues with
Windows 7 not acquiring an IP Address when using a Wireless connection.
6. Start Damn Vulnerable Windows 7
Instructions:
1. Click on Damn Vulnerable Windows 7
2. Click on Play virtual machine
Section 2: Login to Windows 7
1. Select Login User
Instructions:
1. Click on Security Student
Note(FYI):
Security Student does belong to the Administrators group.
5. Restart Machine
Instructions:
1. Click the Start Button
2. Click the Arrow next to Shutdown
3. Click Restart
Section 5: Login to Windows 7
1. Select Login User
Instructions:
1. Click on Security Student
Note(FYI):
Security Student does belong to the Administrators group.
2. Switch User
Instructions:
1. Supply the student password (abc123).
2. Click on the arrow
Section 6: Verify you have a Network IP Address
1. Bring up Command Prompt
Instructions:
1. Click the Windows Start Button
2. Type cmd in the search box
3. Click on cmd
2. Record IP Address
Instructions:
1. ipconfig
2. Record your IP Address
Notes(FYI):
1. In my case, my IP Address is 192.168.121.172.
2. In your case, your IP Address will probably be different.
3. Command History
Instructions:
1. echo "MS12_020 RDP DoS Attack"
Notes(FYI):
In the following lesson, we will use Volatility to interrogate and retrieve the command
history: (1) ipconfig and (2) echo "MS12...."
6. Exploit RDP
Instructions:
1. exploit
2. exit
3. exit
Note(FYI):
Command #1, Use (exploit) to commence the attack.
Command #2, Exit from the msfconsole.
Command #3, Exit from script.
Section 10: Save Blue Screen of Death Screenshot
1. Save a Screenshot (On Damn Vulnerable Windows 7)
Instructions:
1. Press <Ctrl> and <Alt>
2. Press <PrtScn>
3. Paste into MS Paint
4. Save MS Paint File
Note(FYI):
It is very important you save this screen for the subsequent memory analysis lesson that
we will conduct for this particular attack vector.
2. Shut Down Damn Vulnerable Windows 7
Instructions:
1. Player --> Power --> Shut Down Guest
2. Select Yes
9. Configure Memory
Instructions:
1. Select Memory
2. Click on "1 GB"
Note(FYI):
Do not click on the OK Button
Earlier, we lowered the amount of memory to 512 MB to limit the size of the crash dump
file. Now that we have the crash dump file, we can set the memory used back to the
recommended requirement.
10. Configure Network Adapter
Instructions:
1. Select Network Adapter
2. Click the radio button "NAT: Used to share the host's IP address"
3. Click the OK button
Note(FYI):
We will use NAT instead of bridged, because of multiple VMware Player issues with
Windows 7 not acquiring an IP Address when using a Wireless connection.
11. Start Damn Vulnerable Windows 7
Instructions:
1. Click on Damn Vulnerable Windows 7
2. Click on Play virtual machine
12. Windows Error Recovery
Instructions:
1. Arrow Down to Start Windows Normally
2. Press <Enter>
2. Initialize Disk
Instructions:
1. Click on Disk Management
2. Check Disk 1
3. Select MBR (Master Boot Record)
4. Click the OK Button
3. Create New Simple Volume...
Instructions:
1. Right Click on 5.0 GB Unallocated
2. Click on New Simple Volume...
7. Format Partition
Instructions:
1. Click the Format this volume with the following settings: radio button.
2. File system: NTFS
3. Allocation unit size: Default
4. Volume label: FORENSICS
5. Check Perform a quick format
6. Click the Next button
8. Completed New Simple Volume Wizard
Instructions:
1. Click the Finish button
4. Extract bluescreenview
Instructions:
1. Right Click on bluescreenview
2. Touch 7-Zip
3. Click on Extract to "bluescreenview\"
5. Open bluescreenview folder
Instructions:
1. Right Click on bluescreenview
2. Click on Open
6. Run BlueScreenView
Instructions:
1. Right Click on BlueScreenView
2. Click on Open
7. User Account Control
Instructions:
1. Click the Yes button
2. Proof of Lab
Instructions:
1. cd /forensics/ms12_020
2. grep -i rhost ms12_020.txt
3. grep -i send ms12_020.txt
4. date
5. echo "Your Name"
Replace the string "Your Name" with your actual name.
e.g., echo "John Gray"
Note(FYI):
Command #1, Change directory to /forensics/ms12_020.
Command #2, Use the command (grep) to display only lines that contain the string
(rhost) in the script file (ms12_020.txt). Use the flag(-i) to ignore case for the string
(rhost).
Command #3, Use the command (grep) to display only lines that contain the string
(send) in the script file (ms12_020.txt). Use the flag(-i) to ignore case for the string
(send).
Proof of Lab Instructions:
1. Do a PrtScn
2. Paste into a word document
3. Upload to Moodle