Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-33073 PoC — Microsoft Windows SMB Server 访问控制错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows SMB Server 访问控制错误漏洞 (CVE-2025-33073)
Description:Microsoft Windows SMB Server是美国微软(Microsoft)公司的一个网络文件共享协议。它允许计算机上的应用程序读取和写入文件以及从计算机网络中的服务器程序请求服务。 Microsoft Windows SMB Server存在访问控制错误漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 11 Version 22H2 for x64-based Systems,Wi
Readme
# Obscura$ DNS Relay Injector + NTLM Coercion Tool

A stealthy proof-of-concept that chains DNS injection, NTLM relay, and RPC-based coercion to test authentication relay paths in Windows Active Directory environments.

> ⚠️ **DISCLAIMER: For authorized security testing and educational use only.**  
> ❌ Unauthorized use is strictly prohibited. The author takes no responsibility for misuse.

---

## 🔧 Features

- Injects DNS `A` records via `samba-tool`
- Verifies DNS record propagation
- Launches NTLM relay listener using `impacket-ntlmrelayx`
- Triggers forced authentication via `rpcping` (MS-RPRN coercion)
File Snapshot

[4.0K] /data/pocs/067a8c721729fe97495589e3152d79ac4a34aa3e ├── [1.0K] LICENSE ├── [2.9K] main.py └── [ 625] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.