POC详情: c5303ac49a6d1f5c714ee419ccb8b59988f45ee2

来源
关联漏洞
标题: Microsoft Windows SMB Server 访问控制错误漏洞 (CVE-2025-33073)
描述:Microsoft Windows SMB Server是美国微软(Microsoft)公司的一个网络文件共享协议。它允许计算机上的应用程序读取和写入文件以及从计算机网络中的服务器程序请求服务。 Microsoft Windows SMB Server存在访问控制错误漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 11 Version 22H2 for x64-based Systems,Wi
介绍
# CVE-2025-33073 Checker Script

This rough PoC checker script tests targets for CVE-2025-33073 vulnerability by attempting to perform NTLM reflection attacks using NTLM auth coercion via samba RPC, to do this you need to have account with access to the samba.

Also you need to register a domain `localhost1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbEAYBAAAA` to your attacker IP, as described below in the internal windows DNS. This is by default enabled to any account in the domain. Also LLMNR poisoning can be used [instead](https://github.com/mverschu/CVE-2025-33073).


Before running this script, make sure you understand how the attack works, see explanation [here](https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025).

## Usage

```bash
# Usage: ./CVE-2025-33073-checker.sh -u USERNAME -p PASSWORD -d DOMAIN -i IP_FILE
# Example: 
./CVE-2025-33073-checker.sh -u Administrator -p Password123 -d example.local -i samba_list_ips.txt
```

## Setup

- Install crackmapexec, netcat and python3
- Put [PetitPotam.py](https://github.com/topotam/PetitPotam) to the same directory as this script
- Register a domain localhost1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbEAYBAAAA to attacker IP in DDNS. You can use [dnstool.py](https://github.com/dirkjanm/krbrelayx/blob/master/dnstool.py) or [powermad](https://github.com/Kevin-Robertson/Powermad).

## Resources
- https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025
- https://github.com/mverschu/CVE-2025-33073
- https://github.com/topotam/PetitPotam
文件快照

[4.0K] /data/pocs/c5303ac49a6d1f5c714ee419ccb8b59988f45ee2 ├── [3.0K] CVE-2025-33073-checker.sh └── [1.6K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。