您的位置 首页 网络安全

CVE-­2021­-1732 Microsoft Windows10 本地提权漏洞复现

首先奉上大佬写的exphttps://github.com/KaLendsi/CVE-2021-1732-Ex…

首先奉上大佬写的exphttps://github.com/KaLendsi/CVE-2021-1732-Exploit

受影响得版本及应用版本

Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows Server, version 1909 (Server Core installation)
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
漏洞复现

从GitHub上下载,用Visual Studio 2019打开项目,选择ExploitTest.sln文件

生成可执行文件

将文件移到漏洞范围内的靶机,运行,提权成功

本文来自网络,不代表F12sec立场,转载请注明出处:http://www.0dayhack.net/index.php/1378/
头像

作者: zCooli

发表评论

您的电子邮箱地址不会被公开。 必填项已用*标注

CAPTCHAis initialing...
联系我们

联系我们

QQ群:884338047

在线咨询: QQ交谈

邮箱: 2676666667@qq.com

工作时间:周一至周五,9:00-17:30,节假日休息

关注微信
微信扫一扫关注我们

微信扫一扫关注我们

关注微博
返回顶部