Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21823 PoC — Microsoft Graphics Component 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Graphics Component 安全漏洞 (CVE-2023-21823)
Description:Microsoft Graphics Component是美国微软(Microsoft)公司的图形驱动组件。 Microsoft Graphics Component存在安全漏洞。以下产品和版本受到影响:Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Syste
Description
 CVE-2023-21823 PoC
Readme
# CVE-2023-21823 Reverse Shell for Windows

This repository contains C code that implements a reverse shell for the Windows operating system. A reverse shell allows for remote system control using the command-line, providing the ability to execute commands on the infected machine.

## Important

Using this code for illegal purposes or without the permission of the system owner is unlawful and against ethical principles. This code is provided for educational and research purposes only.

## Building

To build the project, you will need a C compiler such as [MinGW](http://www.mingw.org/) or [Microsoft Visual Studio](https://visualstudio.microsoft.com/).

## MinGW

1. Install MinGW if you don't have it already.
2. Open the command prompt and navigate to the directory containing the source code.
3. Run the following command to build the project:

```bash
gcc -o reverse_shell.exe main.c -lws2_32
```

## Microsoft Visual Studio
1. Install Visual Studio if you don't have it already.
2. Create a new C project, and then add the source code to the project.
3. In the project settings, add the ws2_32.lib library.
4. Build the project.

## Usage
Before using the reverse shell:

1. Replace the IP address ("192.168.0.1") with your own IP address where the port will be listened to.
2. Replace the port number (1234) with the port number you want to use for listening.

To run the reverse shell:

1. On your computer, open a port for listening using a tool such as netcat. For example:
```bash
nc -l -p 1234
```
2. Execute the compiled `reverse_shell.exe` file on the target computer.
After this, you will have remote access to the target computer's command-line via the specified port.
File Snapshot

[4.0K] /data/pocs/138a543362e40c2819d8e906c60cf41cb64cb772 ├── [2.9K] poc.с └── [1.7K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.