刚刚捞到的提权0DAY,亲测2K3成功.

分类:工具 | 2013-06-30 | 撸过 1,114 次
6人扯谈

不多说 上图:

windows 提权0day

windows 提权0day

下载地址:EPATHOBJExploit

本站内容均为原创,转载请务必保留署名与链接!
刚刚捞到的提权0DAY,亲测2K3成功.:https://www.webshell.cc/4381.html

随机日志

本机XP,测试无果,[+] No luck, cleaning up. and try again..
[+] start CreateRoundRectRgn
[+] Watchdog thread 17891252 waiting on Mutex
[+] Allocated 1244692 HRGN objects
[+] Flattening curves...
[+] Exploit ok run command
[!] Mutex object did not timeout, list not patched

webshell服务器测试,无响应,超时。。

06-30 17:26 回复

the win32k.sys EPATHOBJ 0day exploit********************************************************************** exploit by: ****** 0day finder: ****** tested system:xp/2003/win7/2008 (*32bit*) **********************************************************************[+] Get FixAddress --> 0x0012fe0c[+] Alllocated userspace PATHRECORD () 0012FE14[+] ->next @ 0012FE08[+] ->prev @ 0012FDFC[+] ->flags @ 1244656[+] Creating complex bezier path with 12fde4[+] start CreateRoundRectRgn[+] Watchdog thread 12124088 waiting on Mutex[+] Allocated 1244692 HRGN objects[+] Flattening curves...[+] Exploit ok run command

好像看着是成功了,但是NET USER ,没有添加成功。

06-30 17:28 回复

the win32k.sys EPATHOBJ 0day exploit********************************************************************** exploit by: ****** 0day finder: ****** tested system:xp/2003/win7/2008 (*32bit*) **********************************************************************[+] Get FixAddress --> 0x0012fe0c[+] Alllocated userspace PATHRECORD () 0012FE14[+] ->next @ 0012FE08[+] ->prev @ 0012FDFC[+] ->flags @ 1244656[+] Creating complex bezier path with 12fde4[+] start CreateRoundRectRgn[+] Watchdog thread 12124088 waiting on Mutex[+] Allocated 1244692 HRGN objects[+] Flattening curves...[+] Exploit ok run command

好像看着是成功了,但是NET USER ,没有添加成功。

06-30 17:28 回复

这个是利用的哪个漏洞?

07-13 16:02 回复

测试了 然后服务器直接挂了 也不知道加得用户没有

08-17 15:29 回复