Exploiting Remote Procedure Call (RPC) Services
Description
Remote Procedure Calls (RPCs) are a generic framework for clients to execute procedures on servers and have the result returned if there is one. Unfortunately, history has shown that RPCs can be vulnerable to buffer overflow attacks that allow attackers to inject malicious code that is executed. To make matters worse, many RPC services run with elevated privileges giving attackers complete control over vulnerable systems.
In this Lab, you will gain quite a bit of information via RPC services. You will use a Kali Linux host to gain further information about a Metasploitable 2 host. Both hosts are running as virtual machines in a Hyper-V virtual environment.
This Lab is designed for the CREST Practitioner Security Analyst (CPSA) certification examination but is of value to security practitioners in general.
Learning Objectives
Upon completion of this Lab you will be able to:
- Scan remote systems for RPC access using Nmap
- Learn about the kinds of information attackers may target
- Describe the options available for securing RPC services
Intended Audience
This Lab is intended for:
- CREST CPSA certification examinees
- Security practitioners
- System administrators
Prerequisites
You should be familiar with:
- Working at the command-line in Linux
You can fulfill the prerequisites by completing the Linux Command Line Byte Session Learning Path.
Updates
November 14th, 2022 - Updated the instructions and screenshots to reflect the latest UI
June 1st, 2021 - Added instruction to install missing signature for apt command
July 10th, 2020 - Enabled direct browser RDP connection for a streamlined experience
July 1st, 2019 - Added instruction to install the missing package on Kali Linux for rpcinfo