<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>复现 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E5%A4%8D%E7%8E%B0/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:23:34 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>SMB空指针引用攻击（CVE-2018-0833）复现</title>
		<link>/web/514.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 11:18:17 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[cve]]></category>
		<category><![CDATA[复现]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">/?p=514</guid>

					<description><![CDATA[1.漏洞简介 服务器信息块（SMB）是一个网络文件共享协议，它允许应用程序和终端用户从远端的文件服务器访问文件资源。这个崩溃发生的模块是“mrxsmb”。这是一个微软服务器消息块(...]]></description>
										<content:encoded><![CDATA[<p><strong>1.<span class="wpcom_tag_link"><a href="/tags/%e6%bc%8f%e6%b4%9e" title="漏洞" target="_blank">漏洞</a></span>简介</strong><br />
服务器信息块（SMB）是一个网络文件共享协议，它允许应用程序和终端用户从远端的文件服务器访问文件资源。这个崩溃发生的模块是“<code>mrxsmb</code>”。这是一个微软服务器消息块(SMB)的重定向器。<code>Windows 8.1</code>和<code>Windows server 2012 R2</code>存在该漏洞，在Windows 8.1 (x86)上执行，发送一个精心构造的数据包，因为它想要从地址<code>0x00000030</code>的内存中读取一个<code>受保护的(空页保护)值</code>，该值处于受保护的内存空间，会引起内核的处理异常，迫使机器重启造成拒绝服务。</p>
<div class="kx_md_br_div"></div>
<p><strong>2.<span class="wpcom_tag_link"><a href="/tags/%e5%a4%8d%e7%8e%b0" title="复现" target="_blank">复现</a></span>过程</strong><br />
目标环境：虚拟机windows 8<br />
IP: 192.168.192.141<br />
<img class="div_message_boxShadow" src="http://www.5ecurity.cn/usr/uploads/2018/03/1563919199.png" alt="1.png" /></p>
<div class="kx_md_br_div"></div>
<p>受影响版本为<code>Windows 8.1</code>和<code>Windows server 2012 R2</code>，这里选取了<code>Windows8.1</code>。</p>
<div class="kx_md_br_div"></div>
<p>攻击端环境：Kali Linux<br />
IP：192.168.192.139<br />
<img class="div_message_boxShadow" src="http://www.5ecurity.cn/usr/uploads/2018/03/666107847.png" alt="2.png" /></p>
<div class="kx_md_br_div"></div>
<p>运行PoC脚本等待靶机访问。</p>
<table class="syntaxhighlighter  python" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td class="gutter">
<div class="line number1 index0 alt2">1</div>
</td>
<td class="code">
<div class="container">
<div class="line number1 index0 alt2"><code class="python plain">python PoC.py</code></div>
</div>
</td>
</tr>
</tbody>
</table>
<p><img class="div_message_boxShadow" src="http://www.5ecurity.cn/usr/uploads/2018/03/1535317972.png" alt="3.png" /></p>
<div class="kx_md_br_div"></div>
<p>靶机中输入Kali Linux的IP访问。</p>
<table class="syntaxhighlighter  python" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td class="gutter">
<div class="line number1 index0 alt2">1</div>
</td>
<td class="code">
<div class="container">
<div class="line number1 index0 alt2"><code class="python plain">\\</code><code class="python value">192.168</code><code class="python plain">.</code><code class="python value">192.139</code></div>
</div>
</td>
</tr>
</tbody>
</table>
<p><img class="div_message_boxShadow" src="http://www.5ecurity.cn/usr/uploads/2018/03/2179088747.png" alt="4.png" /></p>
<div class="kx_md_br_div"></div>
<p><img class="div_message_boxShadow" src="http://www.5ecurity.cn/usr/uploads/2018/03/1013245602.png" alt="5.png" /></p>
<div class="kx_md_br_div"></div>
<p>触发BSoD。<br />
<img class="div_message_boxShadow" src="http://www.5ecurity.cn/usr/uploads/2018/03/3905112452.png" alt="6.png" /></p>
<div class="kx_md_br_div"></div>
<p><strong>3.参考链接</strong><br />
https://krbtgt.pw/smbv3-null-pointer-dereference-vulnerability/<br />
https://www.exploit-db.com/exploits/44189/</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
