🟨MSRPC / RPCbind
ℹ️ Introduction
An interprocess communication technique. The Full form of RPC is Remote Procedure Call. It is used for client-server applications. RPC mechanisms are used when a computer program causes a procedure or subroutine to execute in a different address space, which is coded as a normal procedure call without the programmer specifically coding the details for the remote interaction.
This procedure call also manages low-level transport protocol, such as User Datagram Protocol, Transmission Control Protocol/Internet Protocol etc. It is used for carrying the message data between programs.
Types of RPC
Three types of RPC are:
Callback RPC
Broadcast RPC
Batch-mode RPC
RPC Architecture
RPC architecture has mainly five components of the program:
Client
Client Stub
RPC Runtime
Server Stub
Server
☑️ Checklist
Enumeration
Check for Null user sessions
automate user enumeration with a list of usernames
a simple loop to check RPC users in bash
metasploit
rpcdump
rpcdump and ifids Windows utilities query both the RPC locator and specific RPC endpoints to list IFID values.
NIS
If you find the service ypbind
running:
You can try to exploit it. Anyway, first of all you will need to guess the NIS "domain name" of the machine (when NIS is installed it's configured a "domain name") and without knowing this domain name you cannot do anything.
Upon obtaining the NIS domain name for the environment (example.org in this case), use the ypwhich command to ping the NIS server and ypcat to obtain sensitive material. You should feed encrypted password hashes into John the Ripper, and once cracked, you can use it to evaluate system access and privileges.
Master file | Map(s) | Notes |
/etc/hosts | hosts.byname, hosts.byaddr | Contains hostnames and IP details |
/etc/passwd | passwd.byname, passwd.byuid | NIS user password file |
/etc/group | group.byname, group.bygid | NIS group file |
/usr/lib/aliases | mail.aliases | Details mail aliases |
Bypass Filtered Portmapper port
Login Brute Force
Last updated