Exploiting Remote Procedure Call (RPC) Services

Lab Steps

keyboard_tab
lock
Logging into the Microsoft Azure Portal
lock
Connecting to the Lab Host Virtual Machine Using RDP
lock
Exploiting Remote Procedure Call (RPC) Services

Ready for the real environment experience?

DifficultyIntermediate
Duration40m
Students8
Ratings
5/5
star star star star star

Description

Remote Procedure Calls (RPCs) are a generic framework for clients to execute procedures on servers and have the result returned if there is one. Unfortunately, history has shown that RPCs can be vulnerable to buffer overflow attacks that allow attackers to inject malicious code that is executed. To make matters worse, many RPC services run with elevated privileges giving attackers complete control over vulnerable systems.

In this Lab, you will gain quite a bit of information via RPC services.  You will use a Kali Linux host to gain further information about a Metasploitable 2 host. Both hosts are running as virtual machines in a Hyper-V virtual environment.

This Lab is designed for the CREST Practitioner Security Analyst (CPSA) certification examination but is of value to security practitioners in general.

Learning Objectives

Upon completion of this Lab you will be able to:

  • Scan remote systems for RPC access using Nmap
  • Learn about the kinds of information attackers may target
  • Describe the options available for securing RPC services

Intended Audience

This Lab is intended for:

  • CREST CPSA certification examinees
  • Security practitioners
  • System administrators

Prerequisites

You should be familiar with:

  • Working at the command-line in Linux

You can fulfill the prerequisites by completing the Linux Command Line Byte Session Learning Path.

Updates

July 1st, 2019 - Added instruction to install the missing package on Kali Linux for rpcinfo

Environment before
PREVIEW
arrow_forward
Environment after
PREVIEW

About the Author

Students28910
Labs93
Courses10
Learning paths6

Logan has been involved in software development and research since 2007 and has been in the cloud since 2012. He is an AWS Certified DevOps Engineer - Professional, AWS Certified Solutions Architect - Professional, Microsoft Certified Azure Solutions Architect Expert, MCSE: Cloud Platform and Infrastructure, Google Cloud Certified Associate Cloud Engineer, Certified Kubernetes Administrator (CKA), Certified Kubernetes Application Developer (CKAD), Linux Foundation Certified System Administrator (LFCS), and Certified OpenStack Administrator (COA). He earned his Ph.D. studying design automation and enjoys all things tech.

Covered Topics