刚刚捞到的提权0DAY,亲测2K3成功.

分类:工具 | 2013-06-30 | 撸过 338 次
6人扯谈

不多说 上图:

windows 提权0day

windows 提权0day

下载地址:EPATHOBJExploit

本站内容均为原创,转载请务必保留署名与链接!
刚刚捞到的提权0DAY,亲测2K3成功.:https://www.webshell.cc/4381.html

随机日志

  1. 本机XP,测试无果,[+] No luck, cleaning up. and try again..
    [+] start CreateRoundRectRgn
    [+] Watchdog thread 17891252 waiting on Mutex
    [+] Allocated 1244692 HRGN objects
    [+] Flattening curves…
    [+] Exploit ok run command
    [!] Mutex object did not timeout, list not patched

    webshell服务器测试,无响应,超时。。

  2. the win32k.sys EPATHOBJ 0day exploit********************************************************************** exploit by: ****** 0day finder: ****** tested system:xp/2003/win7/2008 (*32bit*) **********************************************************************[+] Get FixAddress –> 0x0012fe0c[+] Alllocated userspace PATHRECORD () 0012FE14[+] ->next @ 0012FE08[+] ->prev @ 0012FDFC[+] ->flags @ 1244656[+] Creating complex bezier path with 12fde4[+] start CreateRoundRectRgn[+] Watchdog thread 12124088 waiting on Mutex[+] Allocated 1244692 HRGN objects[+] Flattening curves…[+] Exploit ok run command

    好像看着是成功了,但是NET USER ,没有添加成功。

  3. the win32k.sys EPATHOBJ 0day exploit********************************************************************** exploit by: ****** 0day finder: ****** tested system:xp/2003/win7/2008 (*32bit*) **********************************************************************[+] Get FixAddress –> 0x0012fe0c[+] Alllocated userspace PATHRECORD () 0012FE14[+] ->next @ 0012FE08[+] ->prev @ 0012FDFC[+] ->flags @ 1244656[+] Creating complex bezier path with 12fde4[+] start CreateRoundRectRgn[+] Watchdog thread 12124088 waiting on Mutex[+] Allocated 1244692 HRGN objects[+] Flattening curves…[+] Exploit ok run command

    好像看着是成功了,但是NET USER ,没有添加成功。

  4. 测试了 然后服务器直接挂了 也不知道加得用户没有