Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0075 PoC — Microsoft Windows Hyper-V 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Hyper-V 安全漏洞 (CVE-2017-0075)
Description:Microsoft Windows是美国微软(Microsoft)公司的一系列操作系统。Hyper-V是其中的一款虚拟化产品。 Microsoft Windows中的Hyper-V存在远程执行代码漏洞。攻击者可借助特制的应用程序利用该漏洞在主机操作系统上执行任意代码。以下版本受到影响:Microsoft Windows Vista SP2,Windows Server 2008 SP2和R2,Windows 7 SP1,Windows 8.1,Windows Server 2012 Gold和R2,Win
Description
PoC for CVE-2017-0075
Readme
# HyperV
Almost one year ago, I wrote a PoC for CVE-2017-0075 after had read Jordan Rabet's blackhat talk. But I've no time to make a working exploit:(.



File Snapshot

[4.0K] /data/pocs/3d289cbeb1562606cab7924bc60a6c7cd69f1754 ├── [333K] Demo.mp4 ├── [ 156] README.md ├── [4.0K] ring0 │   └── [4.0K] hyperv │   ├── [1.5M] hv_netvsc.ko │   ├── [ 606] hv_netvsc.mod.c │   ├── [ 903] hyper_v.h │   ├── [ 37K] hyperv_net.h │   ├── [ 164] Kconfig │   ├── [ 93] Makefile │   ├── [ 39] modules.order │   ├── [ 38K] netvsc.c │   ├── [ 61K] netvsc_drv.c │   └── [ 37K] rndis_filter.c ├── [4.0K] ring3 │   ├── [8.4K] hyper_v │   ├── [8.4K] hyper_v2 │   ├── [1.1K] hyper_v2.c │   ├── [2.6K] hyper_v.c │   └── [ 56] hyper_v.h └── [ 64] run.sh 3 directories, 18 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.