本机XP,测试无果,[+] No luck, cleaning up. and try again..
[+] start CreateRoundRectRgn
[+] Watchdog thread 17891252 waiting on Mutex
[+] Allocated 1244692 HRGN objects
[+] Flattening curves...
[+] Exploit ok run command
[!] Mutex object did not timeout, list not patched
大兄弟出个教程啊
1
测试了 然后服务器直接挂了 也不知道加得用户没有
这个是利用的哪个漏洞?
the win32k.sys EPATHOBJ 0day exploit********************************************************************** exploit by: ****** 0day finder: ****** tested system:xp/2003/win7/2008 (*32bit*) **********************************************************************[+] Get FixAddress --> 0x0012fe0c[+] Alllocated userspace PATHRECORD () 0012FE14[+] ->next @ 0012FE08[+] ->prev @ 0012FDFC[+] ->flags @ 1244656[+] Creating complex bezier path with 12fde4[+] start CreateRoundRectRgn[+] Watchdog thread 12124088 waiting on Mutex[+] Allocated 1244692 HRGN objects[+] Flattening curves...[+] Exploit ok run command
好像看着是成功了,但是NET USER ,没有添加成功。
the win32k.sys EPATHOBJ 0day exploit********************************************************************** exploit by: ****** 0day finder: ****** tested system:xp/2003/win7/2008 (*32bit*) **********************************************************************[+] Get FixAddress --> 0x0012fe0c[+] Alllocated userspace PATHRECORD () 0012FE14[+] ->next @ 0012FE08[+] ->prev @ 0012FDFC[+] ->flags @ 1244656[+] Creating complex bezier path with 12fde4[+] start CreateRoundRectRgn[+] Watchdog thread 12124088 waiting on Mutex[+] Allocated 1244692 HRGN objects[+] Flattening curves...[+] Exploit ok run command
好像看着是成功了,但是NET USER ,没有添加成功。
本机XP,测试无果,[+] No luck, cleaning up. and try again..
[+] start CreateRoundRectRgn
[+] Watchdog thread 17891252 waiting on Mutex
[+] Allocated 1244692 HRGN objects
[+] Flattening curves...
[+] Exploit ok run command
[!] Mutex object did not timeout, list not patched
webshell服务器测试,无响应,超时。。