【Exp】Microsoft SRV2.SYS SMB

admin 2021年4月3日19:03:51评论33 views字数 1251阅读4分10秒阅读模式

Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference(内网者的福音)

Exploited by Piotr Bania // www.piotrbania.com
Exploit for Vista SP2/SP1 only, should be reliable!

Tested on:
Vista sp2 (6.0.6002.18005)
Vista sp1 ultimate (6.0.6001.18000)

Kudos for:
Stephen, HDM, Laurent Gaffie(bug) and all the mates i know, peace.
Special kudos for prdelka for testing this shit and all the hosters.

Sample usage
------------

> smb2_exploit.exe 192.167.0.5 45 0
> telnet 192.167.0.5 28876

Microsoft Windows [Version 6.0.6001]
Copyright (c) 2006 Microsoft Corporation.  All rights reserved.

C:Windowssystem32>whoami
whoami
nt authoritysystem
C:Windowssystem32>

When all is done it should spawn a port TARGET_IP:28876

RELEASE UPDATE 08/2010:
----------------------
This exploit was created almost a year ago and wasnt modified from that time
whatsoever. The vulnerability itself is patched for a long time already so
i have decided to release this little exploit. You use it for your own
responsibility and im not responsible for any potential damage this thing
can cause. Finally i don't care whether it worked for you or not.

P.S the technique itself is described here:
http://blog.metasploit.com/2009/10/smb2-351-packets-from-trampoline.html文章来源于lcx.cc:【Exp】Microsoft SRV2.SYS SMB

相关推荐: 【公告】无效、失效友情链接下架、摘除通知

失效链接:     小旋 - http://www。mylcx。cn/ 失效原因:     找不到服务器,无法显示该页,已长达五天之久;百度、谷歌也找不到首页快照。 解决方案:     摘除该链接。 备注信息:     本站会不定期检查友情链接。文章来源于lc…

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年4月3日19:03:51
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   【Exp】Microsoft SRV2.SYS SMBhttps://cn-sec.com/archives/319758.html

发表评论

匿名网友 填写信息