跳到主要内容

windows-提权利用

说明EXP影响范围备注
多系统内核提权https://github.com/Ascotbe/Kernelhub\\
Windows 内核漏洞https://github.com/SecWiki/windows-kernel-exploits\\
====特权类========
烂土豆1https://github.com/ohpe/juicy-potatoWindows 7 – Windows 10 / Server 2016 version 1803该版本更常用
烂土豆1.1https://github.com/uknowsec/SweetPotatoWindows 7 – Windows 10 / Server 2016 version 1803弥补 JuicyPotato 失效场景
烂土豆2https://github.com/itm4n/PrintSpoofer/Windows 10 / Server 2016 version 1607 – Windows 10 / Server 2019 present
烂土豆3https://github.com/antonioCoco/RoguePotato/Windows 10 / Server 2019 version 1809 – present
烂土豆4https://github.com/BeichenDream/GodPotatoWindows Server 2012 - Windows Server 2022 Windows8 - Windows 11
打印服务1https://github.com/ly4k/SpoolFool
打印服务2https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527所有 OS 版本
SharpNightmarehttps://github.com/cube0x0/CVE-2021-1675
Invoke-Nightmarehttps://github.com/calebstewart/CVE-2021-1675
================
CVE-2019-1405+1322[COMahawk]https://github.com/apt69/COMahawkWindows 7 - Windows 10、Windows Server 2008 R2 - 2019
MS16-135https://github.com/Ridter/Pentest/tree/master/powershell/MyShell、https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS16-135Windows Vista - Windows 10,以及 Windows Server 2008 - 2016创建管理员账户
MS16-032https://github.com/Ridter/Pentest/tree/master/powershell/MyShell、https://www.exploit-db.com/exploits/39809Windows 7 < 10 / 2008 < 2012 (x86/x64)创建管理员账户
MS16-016https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS16-0162008/Vista/7可直接“就地提升”
MS14-040https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS14-0402003/2008/2012/7/8可直接“就地提升”
MS11-046https://github.com/SecWiki/windows-kernel-exploits/blob/master/MS11-0462003/2008/7/XP可直接“就地提升”
MS10-059https://github.com/SecWiki/windows-kernel-exploits/blob/master/MS10-0592008/7/Vista反连 nc
====应用类========
MySQL UDFhttps://github.com/koparmalbaris/MySQL-UDF-ExploitationMySQL 4.x ~ 8.x若拿到 root 权限,理论上所有支持 UDF 功能的 mysql 均可被利用
====MSF 类========
SMB RCEexploit/windows/smb/*针对 SMB 的远程利用模块
本地提权exploit/windows/local/*本地提权模块
CVE-2022-21882exploit/windows/local/cve_2022_21882_win32kWindows 7 - Windows 11,Server 2008 R2 - Server 2022
CVE-2019-1405+1322[COMahawk]exploit/windows/local/comahawkWindows 7 - Windows 10、Windows Server 2008 R2 - 2019

注:Windows 提权漏洞,大多需要在桌面环境下才能生效,Shell 环境下可以成功使用的貌似并不多(即便是那些 ps1 脚本类型的 EXP,亦如此。)。