Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
-
-
I haven't tried to pop a shell and I'm not really working on this anymore either. The DLL is mapped into svchost.exe, which runs as network service account and doesn't have access to the filesystem which is why I don't think a shell would be easy to get. 1/2
-
I use a completely different approach and unfortunately it only works for file I/O. 2/2
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.