I had an idea early this morning that may or may not work and may or may not have been attempted before. Frankly, if it has been done before, it hasn’t been done in a while so it’s time to kick it off again. In an effort to get to know more about my peers and friends I’m going to start the ball rolling on the “5 Things You Might Not Know About…” project. The rules:
Hopefully this gets the ball rolling. I’m going to tag the following people in the hopes that they join in on the insanity: Michael Santarcangelo, Justin Foster, Anton Chuvakin, Jennifer Jabbusch, and Erin Jacobs.
Here is a great, and scary, blog post from the folks over at Offensive Security. It details how easy it is to own a fully patched Windows 2000 SP4 server that has the Microsoft IIS FTP 5.0 remote system exploit. From the blog post:
A quick examination of the exploit showed some fancy manipulations in a highly restrictive environment that lead to a”useradd” type payload. The main issue was the relatively small payload size allowed by the SITE command, which was limited to around 500 bytes.
After a bit of tinkering around, we saw that the PASSWORD field would be most suitable to shove a larger payload (bindshell). A quick replacement of the original “user add” shellcode with a secondary encoded egghunter – and a bind shell was presented to us! I wonder how long this 0day has been around…As Rel1k would say to logan_WHD…”it’s OK, it’s OK…”.
The exploit can be downloaded from our exploit archive. To entertain the masses, we also made “Microsoft IIS 5.0 FTP 0 Day – The movie“
The movie can be found here: http://www.offensive-security.com/videos/microsoft-ftp-server-remote-exploit/msftp.html