<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CVE-2009-3103 on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/cve-2009-3103/</link><description>Recent content in CVE-2009-3103 on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 09 Jun 2025 15:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/cve-2009-3103/index.xml" rel="self" type="application/rss+xml"/><item><title>Internal Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_internal/</link><pubDate>Mon, 09 Jun 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_internal/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_internal/image1.png#center" alt="">&lt;/p>
&lt;hr>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>This post analyzes the process of privilege analysis, exploitation, and escalation in a vulnerable Windows environment. To do this, a network scan is carried out using Nmap, identifying open ports and services on the target system. Subsequently, using Metasploit, the presence of vulnerabilities in the SMB service is searched for and verified.&lt;/p>
&lt;p>In particular, the system is found to be vulnerable to CVE-2009-3103, a security flaw in SMB 2.0.2 that allows remote execution of code with elevated privileges. By exploiting this vulnerability, access is gained to the victim machine with NT AUTHORITY\SYSTEM privileges, granting full control over the system.&lt;/p></description></item></channel></rss>