If installing the update is not an option you should apply other measurements such as disabling UDP traffic. I'll wait a bit until people had enough time to patch before releasing this to the public :)
-
-
Prikaži ovu nit
-
Also, shoutout to
@ollypwn for helping me out with my Denial of Service script and my vulnerability scanner!Prikaži ovu nit -
I've been talking to a few professionals that are more experienced than me and I came to the conclusion that it's the best if I keep the source code private for the time being. I surely don't want to put any companies at risk!
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
hey
@layle_ctf whats the parent process that shells are popped from? svchost? -
I haven't tried to pop a shell and I'm not really working on this anymore either. The DLL is mapped into svchost.exe, which runs as network service account and doesn't have access to the filesystem which is why I don't think a shell would be easy to get. 1/2
- Još 1 odgovor
Novi razgovor -
-
-
Nice work
-
Thank you! I was really sick the past few days and I didn't sleep to get this to work, was totally worth it though!
- Još 3 druga odgovora
Novi razgovor -
-
-
It ain't RCE if it doesn't start calc.exe …
#SCNR Great work! -
Will post a video of a calc.exe pop later ;)
Kraj razgovora
Novi razgovor -
-
-
Isn't this the same as
@ollypwn BlueGate exploit? (reported 2 days ago)https://github.com/ollypwn/BlueGate … -
He made a Denial of Service exploit and a vulnerability checker but couldn't achieve RCE yet.
- Još 1 odgovor
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

