Step 1: Information Gathering: The attacker identifies a target SunOS system exporting an NFS file system. This can be done through port scanning (port 2049) or network reconnaissance.
Step 2: File Handle Guessing: The attacker attempts to guess valid NFS file handles. This involves generating potential file handle values based on patterns, known file system structures, or brute-force techniques. The predictability of the file handle generation is key.
Step 3: Handle Validation: The attacker sends NFS requests using the guessed file handles to the target server.
Step 4: Access Granted (if successful): If a guessed file handle is valid, the server grants access to the corresponding file or directory, bypassing the intended access controls. The attacker can then read, write, or execute files depending on the permissions of the accessed file system.