Posts Tagged ‘windows’

VirtualBox 5.0.32 Windows Process COM Injection Privilege Escalation

The process hardening implemented by the VirtualBox driver can be circumvented to load arbitrary code inside a VirtualBox process giving access to the VBoxDrv driver which can allow routes to elevation of privilege from a normal user. Version 5.0.32 is affected. Source: VirtualBox 5.0.32 Windows Process COM Injection Privilege Escalation


Microsoft Windows MS17-010 SMB Remote Code Execution

This Metasploit module uses information disclosure to determine if MS17-010 has been patched or not. Specifically, it connects to the IPC$ tree and attempts a transaction on FID 0. If the status returned is “STATUS_INSUFF_SERVER_RESOURCES”, the machine does not have the MS17-010 patch. This Metasploit module does not require valid SMB credentials in default server […]


ETERNALBLUE 2.2.0 Windows 2008 R2 SMBv1 Zero Day Exploit

ETERNALBLUE is an SMBv1 remote unauthenticated zero day exploit that works on 2008 R2. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this […]