(Damn
Vulnerable Windows XP:
Lesson 6)
{ How to setup the
TFTPD32 Long Filename Buffer Overflow }
Section 0. Background
Information |
- What is Damn Vulnerable Windows XP?
- This is a Windows XP Virtual Machine that
provides a practice environment to conduct ethical penetration
testing, vulnerability assessment, exploitation and forensics
investigation.
- The Microsoft Software License Terms for
the IE VMs are included in the release
notes.
- By downloading and using this
software, you agree to these license
terms.
- What is TFTP?
- Trivial File Transfer Protocol (TFTP) is a
simple, lock-step, File Transfer Protocol which allows a client to get
from or put a file onto a remote host. One of its primary uses is in the
early stages of nodes booting from a local area network. TFTP has been
used for this application because it is very simple to implement.
- What is
the TFTPDWIN v0.4.2 Long Filename Buffer Overflow
Exploit?
- The CVE Vulnerability number is
CVE-2006-4948.
- Stack-based buffer overflow in tftpd.exe in
ProSysInfo TFTP Server TFTPDWIN 0.4.2 and earlier allows remote
attackers to execute arbitrary code or cause a denial of service via a
long file name.
- Implementing the CVE-2011-0609 with UltraVNC
- The following lesson will show you how to
configure UltraVNC.
- The Post-Requisite Lesson will show you how
to illustrate the exploit.
- Pre-Requisite
- Post-Requisite
-
Lab Notes
- In this lab we will do the following:
- Download TFTPDWIN v0.4.2
- Install TFTPDWIN v0.4.2
- Legal Disclaimer
- As a condition of your use of this Web
site, you warrant to computersecuritystudent.com that you will not use
this Web site for any purpose that is unlawful or
that is prohibited by these terms, conditions, and notices.
- In accordance with UCC § 2-316, this
product is provided with "no warranties, either express or implied." The
information contained is provided "as-is", with "no guarantee of
merchantability."
- In addition, this is a teaching website
that does not condone malicious behavior of
any kind.
- You are on notice, that continuing
and/or using this lab outside your "own" test environment
is considered malicious and is against the law.
- © 2015 No content replication of any
kind is allowed without express written permission.
Section 1: Log into
Damn Vulnerable WXP-SP2 |
- Open VMware Player on your windows machine.
- Instructions:
- Click the Start Button
- Type "vmware player" in the search box
- Click on VMware Player
- Edit Virtual Machine Settings
- Instructions:
- Click on Damn Vulnerable WXP-SP2
- Edit Virtual Machine Settings
- Note:
- Before beginning a lesson it is
necessary to check the following VM settings.
- Set Network Adapter
- Instructions:
- Click on Network Adapter
- Click on the radio button "Bridged:
Connected directly to the physical network".
- Click the OK Button
- Start Up Damn Vulnerable WXP-SP2.
- Instructions:
- Start Up your VMware Player
- Play virtual machine
- Logging into Damn Vulnerable WXP-SP2.
- Instructions:
- Click on Administrator
- Password: Supply Password
- Press <Enter> or Click the Arrow
- Note(FYI):
- Password was created in (Lab
1, Section 1, Step 8)
- Open the Command Prompt
- Instructions:
- Click the Start Button
- All Programs --> Accessories -->
Command Prompt
- Obtain Damn Vulnerable WXP-SP2's IP Address
- Instructions:
- ipconfig
- Record Your IP Address
- Note(FYI):
- In my case, Damn Vulnerable WXP-SP2's
IP Address 192.168.1.116.
- This is the IP Address of the
Victim Machine.
Section 2: Install
TFTPD32 |
- Open Firefox
- Instructions:
- Click the Start Button
- All Programs --> Mozilla Firefox
- Download tftpdwin (Part 1)
- Instructions:
- Navigate to the following
URL
-
https://www.exploit-db.com/apps/634fc07c22568e72ce981ce7535ee357-tftpdwin.zip
- Click the Save File Radio Button
- Download tftpdwin (Part 2)
- Instructions:
- Navigate to Desktop -->
My Documents --> Downloads
- Click the Save Button
- Open Download Folder
- Instructions:
- Tools --> Downloads
- Right Click on
tftpdwin.zip
- Click on Open Containing
Folder
- Open
tftpdwin.zip
- Instructions:
- Right Click on
*tftpdwin.zip
- Click Open
- Open
tftpdwin.exe
- Instructions:
- Right Click on
*tftpdwin.exe
- Click Open
- Open File - Security Warning
- Instructions:
- Click the Run Button
- Setup - TFTP Server TFTPDWIN
- Instructions:
- Click the Next Button
- Setup - TFTP Server TFTPDWIN (License
Agreement)
- Instructions:
- Click I accept the
agreement
- Click the Next Button
- Setup - TFTP Server TFTPDWIN (Select
Destination Location)
- Instructions:
- Take the default
destination location.
- Click the Next Button
- Setup - TFTP Server TFTPDWIN (Select Start Menu
Folder)
- Instructions:
- Take the default folder
name.
- Click the Next Button
- Setup - TFTP Server TFTPDWIN (Select Additional
Tasks)
- Note(FYI):
- Creating a desktop icon
is optional... Clutter Free IMHO :-)
- Instructions:
- Click the Next Button
- Setup - TFTP Server TFTPDWIN (How to start the
program)
- Note(FYI):
- Never start up a service
until you securely configured it.
- Consequently, this is a
Damn Vulnerable Machine and security is a moot point in this case.
- Instructions:
- Check Start TFTP Server
TFTPDWIN automatically
- Click the Next Button
- Setup - TFTP Server TFTPDWIN (Ready to Install)
- Instructions:
- Click the Install Button
- Setup - TFTP Server TFTPDWIN (Launch TftpdWin)
- Instructions:
- Check Launch TftpdWin
- Click the Finish Button
- Verify Installation
- Instructions:
- You should see that the
TFTPDWIN application is open
- Verify that TFTPD
is located in the lower left tray
- Open the Command Prompt
- Instructions:
- Click the Start Button
- All Programs --> Accessories -->
Command Prompt
- Proof of Lab
- Instructions:
- dir "C:\Program Files" | find /i "tftp"
- tasklist | findstr "tftp"
- netstat -nao | findstr ":69"
- date /t
- echo "Your Name"
- Put in your actual name in place of
"Your Name"
- e.g., echo "John Gray"
-
Proof of Lab
Instructions
- Press the <Ctrl> and <Alt> key at the
same time.
- Press the <PrtScn> key.
- Paste into a word document
- Upload to Moodle
|
 
|