Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-36934 PoC — Microsoft Windows 访问控制错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 访问控制错误漏洞 (CVE-2021-36934)
Description:Microsoft Windows是美国微软(Microsoft)公司的一种桌面操作系统。 Microsoft Windows 存在访问控制错误漏洞,该漏洞源于系统对多个系统文件的访问控制列表过于宽松,因此存在特权提升漏洞。成功利用此漏洞的攻击者可以使用SYSTEM权限运行任意代码。
Description
PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
Readme
# PyNightmare
PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM fully written in python3

# Explanation
CVE-2021-36934 is a recently discovered vulnerability found by @jonasLyk allowing non-admin users to copy all registry hives which contain very private information like hashes which could lead to Privilege Escalation

# Inspiration
Simple Poc for the HiveNightmare vulnerabilty inspired by @GossiTheDog.

# Scope
Works on all versions of Windows 10, where System Protection is enabled.

# What does this PoC do ?
This exploit will look through Volume Shadow Copy to extract SAM and System files

# Picture
![image](https://user-images.githubusercontent.com/59793368/126884371-26ff69ba-253c-4507-a481-7daf436bfeae.png)
File Snapshot

[4.0K] /data/pocs/580347f6e0a45e6df58320916673ace22cd91f7e ├── [ 714] PyNightmare.py └── [ 724] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.