MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
This Metasploit module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt....
View ArticleMS17-010 EternalRomance / EternalSynergy / EternalChampion SMB Remote Windows...
This Metasploit module will exploit SMB with vulnerabilities in MS17-010 to achieve a write-what-where primitive. This will then be used to overwrite the connection session information with as an...
View ArticleSolaris EXTREMEPARR dtappgather Privilege Escalation
This Metasploit module exploits a directory traversal vulnerability in the dtappgather executable included with Common Desktop Environment (CDE) on unpatched Solaris systems prior to Solaris 10u11...
View ArticleDOUBLEPULSAR Payload Execution / Neutralization
This Metasploit module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for SMB as popularly deployed by ETERNALBLUE. While this module primarily performs code execution...
View ArticleSMB DOUBLEPULSAR Remote Code Execution
This Metasploit module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for SMB as popularly deployed by ETERNALBLUE. While this module primarily performs code execution...
View ArticleRDP DOUBLEPULSAR Remote Code Execution
This Metasploit module executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant for RDP. While this module primarily performs code execution against the implant, the "Neutralize...
View ArticleMicrosoft Windows RRAS Service MIBEntryGet Overflow
This Metasploit module exploits an overflow in the Windows Routing and Remote Access Service (RRAS) to execute code as SYSTEM. The RRAS DCERPC endpoint is accessible to unauthenticated users via SMBv1...
View Article
More Pages to Explore .....