{"id":5018,"date":"2012-08-20T17:01:05","date_gmt":"2012-08-20T20:01:05","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=5018"},"modified":"2019-07-18T12:52:34","modified_gmt":"2019-07-18T15:52:34","slug":"ganhando-acesso-unix-atraves-de-vulnerabilidade-distcc","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2012\/08\/exploits\/ganhando-acesso-unix-atraves-de-vulnerabilidade-distcc\/","title":{"rendered":"Ganhando acesso UNIX atrav\u00e9s de vulnerabilidade distcc"},"content":{"rendered":"<p>Neste pequeno tutorial mostrarei como ganhar acesso a um sistema UNIX explorando vulnerabilidade distcc:<\/p>\n<p>Links de refer\u00eancia vulnerabilidade:<\/p>\n<ul>\n<li>http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2004-2687<\/li>\n<li>http:\/\/www.osvdb.org\/13378<\/li>\n<li>http:\/\/distcc.samba.org\/security.html<\/li>\n<\/ul>\n<p>Vamos colocar o metasploit em a\u00e7\u00e3o:<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/search_distcc.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-5019\" title=\"search_distcc\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/search_distcc-300x217.jpg\"  alt=\"\" width=\"300\" height=\"217\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/search_distcc-300x217.jpg 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/search_distcc-1024x742.jpg 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/search_distcc.jpg 1031w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Ap\u00f3s nossa pesquisa, vamos ver nossas op\u00e7\u00f5es:<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/show_opitons.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-5020\" title=\"show_opitons\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/show_opitons-300x67.jpg\"  alt=\"\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/show_opitons-300x67.jpg 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/show_opitons.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Vamos setar o alvo : 192.168.1.108:<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/set1.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-5023\" title=\"set\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/set1-300x23.jpg\"  alt=\"\" width=\"300\" height=\"23\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/set1-300x23.jpg 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/set1-1024x79.jpg 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/set1.jpg 1026w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Vamos ent\u00e3o verificar as op\u00e7\u00f5es de Payload:<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/payloads2.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-5025\" title=\"payloads\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/payloads2-300x69.jpg\"  alt=\"\" width=\"300\" height=\"69\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/payloads2-300x69.jpg 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/payloads2-1024x238.jpg 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/payloads2.jpg 1028w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Por fim, \u00a0selecionamos o payload e aplicamos o exploit:<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/uname-a.jpg\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-5026\" title=\"uname-a\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/uname-a-300x126.jpg\"  alt=\"\" width=\"300\" height=\"126\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/uname-a-300x126.jpg 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/uname-a-1024x430.jpg 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/uname-a.jpg 1026w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Com a m\u00e1quina j\u00e1 comprometida podemos executar o comando u-name e ifconfig.<\/p>\n<p>Bingo e at\u00e9 a pr\u00f3xima !!!<\/p>\n<p>&nbsp;<\/p>\n\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/186048_100001838322519_1550894_n-11668_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p>Autor: S\u00edlvio C\u00e9sar Roxo Giavaroto<\/p>\n<p>\u00c9 MBA Especialista em Gest\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o,\nTecn\u00f3logo em Redes de Computadores, C|EH Certified Ethical Hacker,\natua como Pentest e Analista de Seguran\u00e7a em Servidores Linux no\nGoverno do Estado de S\u00e3o Paulo, Professor Universit\u00e1rio , Instrutor\nC|EH e C|HFI.<\/p>\r\n\t\t<\/div> <!-- .author-info --><\/p>\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes -->\n","protected":false},"excerpt":{"rendered":"<p>Neste pequeno tutorial mostrarei como ganhar acesso a um sistema UNIX explorando vulnerabilidade distcc: Links de refer\u00eancia vulnerabilidade: http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2004-2687 http:\/\/www.osvdb.org\/13378 http:\/\/distcc.samba.org\/security.html Vamos colocar o metasploit em a\u00e7\u00e3o: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Ap\u00f3s nossa pesquisa, vamos ver nossas op\u00e7\u00f5es: &nbsp; &nbsp; &nbsp; Vamos setar o alvo : 192.168.1.108: &nbsp; Vamos ent\u00e3o verificar [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3315,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,101],"tags":[],"class_list":["post-5018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exploits","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=5018"}],"version-history":[{"count":8,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5018\/revisions"}],"predecessor-version":[{"id":10605,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/5018\/revisions\/10605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/3315"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=5018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=5018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=5018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}