关联漏洞
描述
This is my malware
介绍
# VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC
This is my malware.
I use the CVE 2023-38831, a kind of exploit on WinRAR, to do this malware.
I also use BypassUAC to get Administrator authority.
This is the OVA file of it: [https://ttuedutw-my.sharepoint.com/:u:/g/personal/410806228_o365_ttu_edu_tw/EW7BTI5OBylGjfoxQEkpA6YBrAzL1tMiGkcDzo5EYQxHjw](https://ttuedutw-my.sharepoint.com/:u:/g/personal/410806228_o365_ttu_edu_tw/Ea5fsrEHgBxBsYl40m0QfJ4BJWWFfqXGJB3vQBtqsH86gA?e=tktgkz)
# Disclaimer
I make this malware just want to show the CVE 2023-38831 and bypass-UAC. Please don't use this to do something illegal.
If you do it, I'm not responsible for this. Thank you.
# Reference
https://github.com/HDCE-inc/CVE-2023-38831
https://blog.csdn.net/qq_17550379/article/details/79006718
文件快照
[4.0K] /data/pocs/0c5bc81796b3df215699bf74662f7121de804bf0
├── [ 0] document.pdf
├── [1.3K] exploit.py
├── [1.0K] LICENSE
├── [ 799] README.md
├── [ 200] squid.bat
├── [ 520] volleyball.rar
├── [2.9K] volleyballsquid.py
├── [6.4M] volleysquid.exe
└── [4.5M] WinRAR.zip
0 directories, 9 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。