miΓ©rcoles, 31 de mayo de 2023

Hacking Windows 95, Part 2

In the Hacking Windows 95, part 1 blog post, we covered that through a nasty bug affecting Windows 95/98/ME, the share password can be guessed in no time. In this article, I'm going to try to use this vulnerability to achieve remote code execution (with the help of publicly available tools only).

The first thing we can do when we have read access to the Windows directory through the share, is to locate all the *.pwl files on the c:\windows directory, copy them to your machine where Cain is installed, switch to Cracker tab, pwl files, load the pwl file, add username based on the filename, and try to crack it. If you can't crack it you might still try to add a .pwl file where you already know the password in the remote windows directory. Although this is a fun post-exploitation task, but still, no remote code execution. These passwords are useless without physical access.


One might think that after having a share password and user password, it is easy to achieve remote code execution. The problem is:
  • there is no "at" command (available since Windows 95 plus!)
  • there is no admin share
  • there is no RPC
  • there is no named pipes
  • there is no remote registry
  • there is no remote service management
If you think about security best practices, disabling unnecessary services is always the first task you should do. Because Windows 95 lacks all of these services, it is pretty much secure!

During my quest for a tool to hack Windows 95, I came across some pretty cool stuff:
LanSpy

But the best of the best is Fluxay, which has been written by chinese hackers. It is the metasploit from the year 2000. A screenshot is worth more than a 1000 words. 4 screenshot > 4 thousand words :)





It is pretty hard to find the installer, but it is still out there!

But at the end, no remote code execution for me.

My idea here was that if I can find a file which executes regularly (on a scheduled basis), I can change that executable to my backdoor and I'm done. Although there is no scheduler in the default Windows 95, I gave it a try. 

Let's fire up taskman.exe to get an idea what processes are running:


Looks like we need a more powerful tool here, namely Process Explorer. Let's try to download this from oldapps.com:


LOL, IE3 hangs, can't render the page. Copying files to the Win95 VM is not that simple, because there are no shared folders in Win95 VM. And you can't use pendrives either, Win95 can't handle USB (at least the retail version). After downloading the application with a newer browser from oldapps, let's start Process Explorer on the test Windows 95.


Don't try to download the Winsocks 2 patch from the official MS site, it is not there anymore, but you can download it from other sites

Now let's look at the processes running:


After staring it for minutes, turned out it is constant, no new processes appeared.
Looking at the next screenshot, one can notice this OS was not running a lot of background processes ...


My current Win7 has 1181 threads and 84 processes running, no wonder it is slow as hell :)

We have at least the following options:
  1. You are lucky and not the plain Windows 95 is installed, but Windows 95 Plus! The main difference here is that Windows 95 Plus! has built-in scheduler, especially the "at" command. Just overwrite a file which is scheduled to execution, and wait. Mission accomplished!
  2. Ping of death - you can crash the machine (no BSOD, just crash) with long (over 65535 bytes) ICMP ping commands, and wait for someone to reboot it. Just don't forget to put your backdoor on the share and add it to autoexec.bat before crashing it. 
  3. If your target is a plain Windows 95, I believe you are out of luck. No at command, no named pipes, no admin share, nothing. Meybe you can try to fuzz port 137 138 139, and write an exploit for those. Might be even Ping of Death is exploitable?
Let's do the first option, and hack Windows 95 plus!
Look at the cool features we have by installing Win95 Plus!


Cool new boot splash screen!


But our main interest is the new, scheduled tasks!


Now we can replace diskalm.exe with our backdoor executable, and wait maximum one hour to be scheduled.

Instead of a boring text based tutorial, I created a YouTube video for you. Based on the feedbacks on my previous tutorialz, it turned out I'm way too old, and can't do interesting tutorials. That's why I analyzed the cool skiddie videoz, and found that I have to do the followings so my vidz won't suck anymore:
  • use cool black windows theme
  • put meaningless performance monitor gadgets on the sidebar
  • use a cool background, something related with hacking and skullz
  • do as many opsec fails as possible
  • instead of captions, use notepad with spelling errorz
  • there is only one rule of metal: Play it fuckin' loud!!!!

More info


  1. Hack Website Online Tool
  2. Pentest Tools Open Source
  3. Hacker Tools For Mac
  4. Pentest Tools Tcp Port Scanner
  5. Hackrf Tools
  6. Hacker Search Tools
  7. Hacking Apps
  8. Game Hacking
  9. Hacking Tools Pc
  10. Tools Used For Hacking
  11. Hack Tool Apk No Root
  12. Tools Used For Hacking
  13. Pentest Tools Bluekeep
  14. Pentest Tools Subdomain
  15. Ethical Hacker Tools
  16. Hacker Tools For Mac
  17. Nsa Hacker Tools
  18. Hack And Tools
  19. Hacking Tools Hardware
  20. Hacks And Tools
  21. Hack Tools For Ubuntu
  22. Hacker Tools Windows
  23. Pentest Tools Bluekeep
  24. Pentest Tools Alternative
  25. Pentest Tools For Windows
  26. Best Pentesting Tools 2018
  27. Black Hat Hacker Tools
  28. Hacking Tools For Kali Linux
  29. Hack Website Online Tool
  30. Hacking Tools Windows 10
  31. Wifi Hacker Tools For Windows
  32. Hack Website Online Tool
  33. Hack Tools Pc
  34. Pentest Tools For Android
  35. Pentest Tools Tcp Port Scanner
  36. Pentest Tools Download
  37. Hacker Tools Apk Download
  38. Hack Apps
  39. Pentest Tools Review
  40. Blackhat Hacker Tools
  41. Pentest Tools Nmap
  42. Hak5 Tools
  43. New Hack Tools
  44. Hack Tool Apk
  45. Bluetooth Hacking Tools Kali
  46. Growth Hacker Tools
  47. Pentest Tools Website
  48. Hacking Tools Pc
  49. Hack Tools
  50. Pentest Tools Github
  51. Pentest Reporting Tools
  52. Nsa Hack Tools
  53. Pentest Tools Apk
  54. Hack Tools For Ubuntu
  55. Hacker Tools 2019
  56. Underground Hacker Sites
  57. Android Hack Tools Github
  58. Game Hacking
  59. Best Pentesting Tools 2018
  60. Hacker Tools For Ios
  61. Hack Tool Apk No Root
  62. Pentest Tools Url Fuzzer
  63. Hacking App
  64. Pentest Tools Open Source
  65. Best Pentesting Tools 2018
  66. Hack Tools For Pc
  67. Pentest Tools Tcp Port Scanner
  68. Pentest Tools Url Fuzzer
  69. Hacking Tools For Windows 7
  70. Top Pentest Tools
  71. Pentest Tools Windows
  72. Beginner Hacker Tools
  73. Hacking Tools Usb
  74. Hacker Security Tools
  75. Hacker Tools
  76. Hacker Tools 2019
  77. Hacking Tools Windows
  78. Hacking Tools Online
  79. Hacker Tools Linux
  80. Hacking Tools For Pc
  81. Hacker Search Tools
  82. Pentest Tools For Mac
  83. Hacking Tools Windows
  84. Nsa Hacker Tools
  85. Tools Used For Hacking
  86. Hacking Tools For Windows Free Download
  87. Hack Tools For Pc
  88. Hack Tools 2019
Seguir leyendo

NEW: Sneak Peek Of Tomorrow's Drop πŸ‘€

Launching tomorrow at 8am PT͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌  
Seguir leyendo