POC详情: 378f98483936e354345b974ebd134611a6a5bbf0

来源
关联漏洞
标题: Microsoft Windows 内核安全漏洞 (CVE-2020-1034)
描述:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Windows 内核存在安全漏洞,该漏洞源于处理内存对象的方式中存在特权提升漏洞,攻击者可利用该漏洞执行代码。以下产品及版本受到影响: Windows 10 1909版本, Windows 10 1709版本, Windows Server 1909版本, Windows Server 1903版本, Windows Server 2004版本, Windows 10 2004版本, Windows 10 180
描述
PoC demonstrating the use of cve-2020-1034 for privilege escalation
介绍
# CVE-2020-1034
PoC demonstrating the use of cve-2020-1034 for privilege escalation.
Tested on unpatched Windows 10 2004, build 19041.488.

Vulnerability was dicovered by Microsoft and fixed on patch Tuesday 8/9/2020:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1034

## Writeup
Part 1: https://windows-internals.com/exploiting-a-simple-vulnerability-in-35-easy-steps-or-less  
Part 1.5 - information leak: https://windows-internals.com/exploiting-a-simple-vulnerability-part-1-5-the-info-leak/  
Part 2 - https://windows-internals.com/exploiting-a-simple-vulnerability-part-2-what-if-we-made-exploitation-harder/
文件快照

[4.0K] /data/pocs/378f98483936e354345b974ebd134611a6a5bbf0 ├── [3.6K] cve-2020-1034.sln ├── [4.0K] exploit_part_1 │   ├── [7.2K] exploit_part_1.vcxproj │   ├── [ 956] exploit_part_1.vcxproj.filters │   ├── [ 165] exploit_part_1.vcxproj.user │   └── [ 13K] Main.cpp ├── [4.0K] exploit_part_2 │   ├── [7.1K] exploit_part_2.vcxproj │   ├── [ 956] exploit_part_2.vcxproj.filters │   ├── [ 165] exploit_part_2.vcxproj.user │   └── [ 16K] Main.cpp ├── [4.0K] pool_address_leak │   ├── [2.1K] Main.cpp │   ├── [7.1K] pool_address_leak.vcxproj │   ├── [ 956] pool_address_leak.vcxproj.filters │   └── [ 165] pool_address_leak.vcxproj.user ├── [ 639] README.md └── [4.0K] Utils ├── [ 10K] Header.h ├── [6.9K] Utils.vcxproj ├── [ 956] Utils.vcxproj.filters └── [ 165] Utils.vcxproj.user 4 directories, 18 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。