(Damn 
Vulnerable Windows XP:
Lesson 6)
{ How to setup the 
TFTPD32 Long Filename Buffer Overflow } 
		 
		
			
				| 
				Section 0. Background 
				Information | 
			 
		 
	- What is Damn Vulnerable Windows XP?
		- This is a Windows XP Virtual Machine that 
		provides a practice environment to conduct ethical penetration 
		testing, vulnerability assessment, exploitation and forensics 
		investigation.
 
		- The Microsoft Software License Terms for 
		the IE VMs are included in the release 
		notes.
 
		- By downloading and using this 
		software, you agree to these license 
		terms.
 
	 
	
  
	- What is TFTP?
		- Trivial File Transfer Protocol (TFTP) is a 
		simple, lock-step, File Transfer Protocol which allows a client to get 
		from or put a file onto a remote host. One of its primary uses is in the 
		early stages of nodes booting from a local area network. TFTP has been 
		used for this application because it is very simple to implement.
 
	 
	  
	- What is 
	the TFTPDWIN v0.4.2 Long Filename Buffer Overflow 
	Exploit?
		- The CVE Vulnerability number is
		CVE-2006-4948.
 
		- Stack-based buffer overflow in tftpd.exe in 
		ProSysInfo TFTP Server TFTPDWIN 0.4.2 and earlier allows remote 
		attackers to execute arbitrary code or cause a denial of service via a 
		long file name.
 
	 
	
  
	- Implementing the CVE-2011-0609 with UltraVNC
		- The following lesson will show you how to 
		configure UltraVNC.
 
		- The Post-Requisite Lesson will show you how 
		to illustrate the exploit.
 
	 
	
  
	- Pre-Requisite
	
  
	- Post-Requisite
  
	- 
	Lab Notes
		- In this lab we will do the following:
			- Download TFTPDWIN v0.4.2
 
			- Install TFTPDWIN v0.4.2
 
		  
	   
	- Legal Disclaimer
		- As a condition of your use of this Web 
		site, you warrant to computersecuritystudent.com that you will not use 
		this Web site for any purpose that is unlawful or 
		that is prohibited by these terms, conditions, and notices.
 
		- In accordance with UCC § 2-316, this 
		product is provided with "no warranties, either express or implied." The 
		information contained is provided "as-is", with "no guarantee of 
		merchantability."
 
		- In addition, this is a teaching website 
		that does not condone malicious behavior of 
		any kind.
 
		- You are on notice, that continuing 
		and/or using this lab outside your "own" test environment
		is considered malicious and is against the law.
 
		- © 2015 No content replication of any 
		kind is allowed without express written permission.
 
	  
 
		  
		
			
				| 
				Section 1: Log into 
				Damn Vulnerable WXP-SP2 | 
			 
		 
	- Open VMware Player on your windows machine.
		- Instructions:
			- Click the Start Button
 
			- Type "vmware player" in the search box
 
			- Click on VMware Player
 
		 
		 
		  
	 
	   
	- Edit Virtual Machine Settings	 
	
		- Instructions: 		
		
			- Click on Damn Vulnerable WXP-SP2
 
			- Edit Virtual Machine Settings
 
		 
		 
		- Note:
		
		
			- Before beginning a lesson it is 
			necessary to check the following VM settings.
 
		 
		 
	 
	
	   
	- Set Network Adapter	 
	
		- Instructions: 		
		
			- Click on Network Adapter
 
			- Click on the radio button "Bridged: 
			Connected directly to the physical network".
 
			- Click the OK Button
 
		 
		 
	 
	
	   
	- Start Up Damn Vulnerable WXP-SP2.	 
	
		- Instructions: 		
		
			- Start Up your VMware Player 
			
 
			- Play virtual machine 
 
		 
		 
	 
	
	   
	- Logging into Damn Vulnerable WXP-SP2.	 
	
		- Instructions: 		
		
			- Click on Administrator 
			
 
			- Password: Supply Password 
			
			
 
			- Press <Enter> or Click the Arrow
 
		 
		 
		- Note(FYI):
			- Password was created in (Lab 
			1, Section 1, Step 8)
 
		 
		 
	 
	
	   
	- Open the Command Prompt
		- Instructions:
			- Click the Start Button
 
			- All Programs --> Accessories --> 
			Command Prompt
 
		 
		 
	 
	
	   
	- Obtain Damn Vulnerable WXP-SP2's IP Address
		- Instructions: 
		
			- ipconfig 
 
			- Record Your IP Address
 
		 
		 
		- Note(FYI):
		
		
			- In my case, Damn Vulnerable WXP-SP2's 
			IP Address 192.168.1.116. 
 
			- This is the IP Address of the
			
			Victim Machine. 
 
		 
		 
		  
	 
	 
 
		  
		
			
				| 
				Section 2: Install 
				TFTPD32 | 
			 
		 
	- Open Firefox
		- Instructions:
			- Click the Start Button
 
			- All Programs --> Mozilla Firefox
 
		 
		 
		  
	 
	   
	- Download tftpdwin (Part 1)
		- Instructions:
			- Navigate to the following 
			URL
				- 
				https://www.exploit-db.com/apps/634fc07c22568e72ce981ce7535ee357-tftpdwin.zip
 
			 
			 
			- Click the Save File Radio Button
 
		 
		 
		  
	 
	   
	- Download tftpdwin (Part 2)
		- Instructions:
			- Navigate to Desktop --> 
			My Documents --> Downloads
 
			- Click the Save Button
 
		 
		 
		  
	 
	   
	- Open Download Folder
		- Instructions:
			- Tools --> Downloads
 
			- Right Click on 
			tftpdwin.zip
 
			- Click on Open Containing 
			Folder
 
		 
		 
		  
	 
	   
	- Open 
	tftpdwin.zip
		- Instructions:
			- Right Click on 
			*tftpdwin.zip
 
			- Click Open
 
		  
	 
	
	   
	- Open 
	tftpdwin.exe
		- Instructions:
			- Right Click on 
			*tftpdwin.exe
 
			- Click Open
 
		  
		  
	 
	   
	- Open File - Security Warning
		- Instructions:
			- Click the Run Button
 
		  
	 
	
	   
	- Setup - TFTP Server TFTPDWIN
		- Instructions:
			- Click the Next Button
 
		  
		  
	 
	   
	- Setup - TFTP Server TFTPDWIN (License 
	Agreement)
		- Instructions:
			- Click I accept the 
			agreement
 
			- Click the Next Button
 
		  
	 
	
	   
	- Setup - TFTP Server TFTPDWIN (Select 
	Destination Location)
		- Instructions:
			- Take the default 
			destination location.
 
			- Click the Next Button
 
		  
		  
	 
	   
	- Setup - TFTP Server TFTPDWIN (Select Start Menu 
	Folder)
		- Instructions:
			- Take the default folder 
			name.
 
			- Click the Next Button
 
		  
		  
	 
	   
	- Setup - TFTP Server TFTPDWIN (Select Additional 
	Tasks)
		- Note(FYI):
			- Creating a desktop icon 
			is optional... Clutter Free IMHO :-)
 
		  
		- Instructions:
			- Click the Next Button
 
		  
		  
	 
	   
	- Setup - TFTP Server TFTPDWIN (How to start the 
	program)
		- Note(FYI):
			- Never start up a service 
			until you securely configured it.
 
			- Consequently, this is a 
			Damn Vulnerable Machine and security is a moot point in this case.
 
		  
		- Instructions:
			- Check Start TFTP Server 
			TFTPDWIN automatically
 
			- Click the Next Button
 
		  
		  
	 
	   
	- Setup - TFTP Server TFTPDWIN (Ready to Install)
		- Instructions:
			- Click the Install Button
 
		  
	 
	
	   
	- Setup - TFTP Server TFTPDWIN (Launch TftpdWin)
		- Instructions:
			- Check Launch TftpdWin
 
			- Click the Finish Button
 
		  
		  
	 
	   
	- Verify Installation
		- Instructions:
			- You should see that the 
			TFTPDWIN application is open
 
			- Verify that TFTPD 
			is located in the lower left tray
 
		  
		  
	 
	   
 
		
	- Open the Command Prompt
		- Instructions:
			- Click the Start Button
 
			- All Programs --> Accessories --> 
			Command Prompt
 
		 
		 
	 
	
	   
	- Proof of Lab
		- Instructions: 
		
			- dir "C:\Program Files" | find /i "tftp"
 
			- tasklist | findstr "tftp"
 
			- netstat -nao | findstr ":69"
 
			- date /t
 
			- echo "Your Name"
				- Put in your actual name in place of 
				"Your Name"
 
				- e.g., echo "John Gray"
 
			 
			 
		 
		 
		- 
		Proof of Lab 
		Instructions
		
			- Press the <Ctrl> and <Alt> key at the 
			same time.
 
			- Press the <PrtScn> key. 
 
			- Paste into a word document 
 
			- Upload to Moodle
 
		 
		 
		  
	 
	 
  | 
		
 
  
 
 
 
		
		
		  |