Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-26923 PoC — Microsoft Windows Active Directory 信任管理问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Active Directory 信任管理问题漏洞 (CVE-2022-26923)
Description:Microsoft Windows Active Directory是美国微软(Microsoft)公司的一个负责架构中大型网络环境的集中式目录管理服务。存储有关网络上对象的信息,并使管理员和用户可以轻松查找和使用这些信息。 Microsoft Windows Active Directory存在信任管理问题漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Syst
Description
检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare
Readme
# ADVulnScanner

检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare。

![image-20231023124447347](https://images-1258433570.cos.ap-beijing.myqcloud.com/imagesimage-20231023124447347.png)

File Snapshot

[4.0K] /data/pocs/88054c051278a314515e2692c85b2e11e5ccb16e ├── [4.0K] command │   ├── [4.0K] adcs │   │   ├── [ 34K] ca.py │   │   ├── [ 27K] certificate.py │   │   ├── [1.0K] options.py │   │   ├── [4.0K] __pycache__ │   │   │   ├── [ 26K] ca.cpython-39.pyc │   │   │   ├── [ 941] options.cpython-39.pyc │   │   │   ├── [ 17K] req.cpython-39.pyc │   │   │   └── [6.3K] template.cpython-39.pyc │   │   ├── [ 25K] req.py │   │   └── [8.3K] template.py │   ├── [4.0K] nopac │   │   ├── [ 11K] entry.py │   │   └── [4.0K] __pycache__ │   │   └── [6.7K] entry.cpython-39.pyc │   ├── [4.0K] printnightmare │   │   ├── [5.5K] entry.py │   │   ├── [3.1K] par_vector.py │   │   ├── [4.0K] __pycache__ │   │   │   ├── [3.9K] entry.cpython-39.pyc │   │   │   ├── [2.1K] par_vector.cpython-39.pyc │   │   │   ├── [2.1K] rprn_vector.cpython-39.pyc │   │   │   └── [1.1K] structs.cpython-39.pyc │   │   ├── [3.2K] rprn_vector.py │   │   └── [1.1K] structs.py │   └── [4.0K] zerologon │   ├── [4.8K] entry.py │   └── [4.0K] __pycache__ │   └── [3.2K] entry.cpython-39.pyc ├── [7.3K] main.py └── [ 235] README.md 9 directories, 23 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.