Windows 提权 — 快速查找 exp

微软官方时刻关注列表网址:

https://technet.microsoft.com/zh-cn/library/security/dn639106.aspx
地址更新为:
https://docs.microsoft.com/zh-cn/security-updates/securitybulletins/2017/securitybulletins2017

第一课:windows提权-快速查找exp - 图1

比如常用的几个已公布的 exp:

  • KB2592799
  • KB3000061
  • KB2592799

快速查找未打补丁的 exp,可以最安全的减少目标机的未知错误,以免影响业务。
命令行下执行检测未打补丁的命令如下:

  1. systeminfo>micropoor.txt&(for %i in ( KB977165 KB2160329 KB2503665 KB2592799
  2. KB2707511 KB2829361 KB2850851 KB3000061 KB3045171 KB3077657 KB3079904
  3. KB3134228 KB3143141 KB3141780 ) do @type micropoor.txt|@find /i
  4. "%i"|| @echo %i you can fuck)&del /f /q /a micropoor.txt

注:以上需要在可写目录执行。需要临时生成micrpoor.txt,以上补丁编号请根据环境来增删。

示例

一般实战中在类似 tmp 目录等可写目录下执行:如 C:\tmp>

11-080 为例:
第一课:windows提权-快速查找exp - 图2

第一课:windows提权-快速查找exp - 图3

第一课:windows提权-快速查找exp - 图4

exp注:

  1. MS17-017 [KB4013081] [GDI Palette Objects Local Privilege Escalation] (windows 7/8)
  2. CVE-2017-8464 [LNK Remote Code Execution Vulnerability] (windows 10/8.1/7/2016/2010/2008
  3. CVE-2017-0213 [Windows COM Elevation of Privilege Vulnerability] (windows 10/8.1/7/2016/2010/2008)
  4. MS17-010 [KB4013389] [Windows Kernel Mode Drivers](windows 7/2008/2003/XP)
  5. MS16-135 [KB3199135] [Windows Kernel Mode Drivers] (2016)
  6. MS16-111 [KB3186973] [kernel api] (Windows 10 10586 (32/64)/8.1)
  7. MS16-098 [KB3178466] [Kernel Driver] (Win 8.1)
  8. MS16-075 [KB3164038] [Hot Potato] (2003/2008/7/8/2012)
  9. MS16-034 [KB3143145] [Kernel Driver] (2008/7/8/10/2012)
  10. MS16-032 [KB3143141] [Secondary Logon Handle] (2008/7/8/10/2012)
  11. MS16-016 [KB3136041] [WebDAV] (2008/Vista/7)
  12. MS15-097 [KB3089656] [remote code execution] (win8.1/2012)
  13. MS15-076 [KB3067505] [RPC] (2003/2008/7/8/2012)
  14. MS15-077 [KB3077657] [ATM] (XP/Vista/Win7/Win8/2000/2003/2008/2012)
  15. MS15-061 [KB3057839] [Kernel Driver] (2003/2008/7/8/2012)
  16. MS15-051 [KB3057191] [Windows Kernel Mode Drivers] (2003/2008/7/8/2012)
  17. MS15-010 [KB3036220] [Kernel Driver] (2003/2008/7/8)
  18. MS15-015 [KB3031432] [Kernel Driver] (Win7/8/8.1/2012/RT/2012 R2/2008 R2)
  19. MS15-001 [KB3023266] [Kernel Driver] (2008/2012/7/8)
  20. MS14-070 [KB2989935] [Kernel Driver] (2003)
  21. MS14-068 [KB3011780] [Domain Privilege Escalation] (2003/2008/2012/7/8)
  22. MS14-058 [KB3000061] [Win32k.sys] (2003/2008/2012/7/8)
  23. MS14-040 [KB2975684] [AFD Driver] (2003/2008/2012/7/8)
  24. MS14-002 [KB2914368] [NDProxy] (2003/XP)
  25. MS13-053 [KB2850851] [win32k.sys] (XP/Vista/2003/2008/win 7)
  26. MS13-046 [KB2840221] [dxgkrnl.sys] (Vista/2003/2008/2012/7)
  27. MS13-005 [KB2778930] [Kernel Mode Driver] (2003/2008/2012/win7/8)
  28. MS12-042 [KB2972621] [Service Bus] (2008/2012/win7)
  29. MS12-020 [KB2671387] [RDP] (2003/2008/7/XP)
  30. MS11-080 [KB2592799] [AFD.sys] (2003/XP)
  31. MS11-062 [KB2566454] [NDISTAPI] (2003/XP)
  32. MS11-046 [KB2503665] [AFD.sys] (2003/2008/7/XP)
  33. MS11-011 [KB2393802] [kernel Driver] (2003/2008/7/XP/Vista)
  34. MS10-092 [KB2305420] [Task Scheduler] (2008/7)
  35. MS10-065 [KB2267960] [FastCGI] (IIS 5.1, 6.0, 7.0, and 7.5)
  36. MS10-059 [KB982799] [ACL-Churraskito] (2008/7/Vista)
  37. MS10-048 [KB2160329] [win32k.sys] (XP SP2 & SP3/2003 SP2/Vista SP1 & SP2/2008 Gold & SP2 & R2/Win7)
  38. MS10-015 [KB977165] [KiTrap0D] (2003/2008/7/XP)
  39. MS10-012 [KB971468] [SMB Client Trans2 stack overflow] (Windows 7/2008R2)
  40. MS09-050 [KB975517][Remote Code Execution] (2008/Vista)
  41. MS09-020 [KB970483] [IIS 6.0] (IIS 5.1 and 6.0)
  42. MS09-012 [KB959454] [Chimichurri] (Vista/win7/2008/Vista)
  43. MS08-068 [KB957097] [Remote Code Execution] (2000/XP)
  44. MS08-067 [KB958644] [Remote Code Execution] (Windows 2000/XP/Server 2003/Vista/Server 2008)
  45. MS08-066 [] [] (Windows 2000/XP/Server 2003)
  46. MS08-025 [KB941693] [Win32.sys] (XP/2003/2008/Vista)
  47. MS06-040 [KB921883] [Remote Code Execution] (2003/xp/2000)
  48. MS05-039 [KB899588] [PnP Service] (Win 9X/ME/NT/2000/XP/2003)
  49. MS03-026 [KB823980] [Buffer Overrun In RPC Interface] (/NT/2000/XP/2003)

已对外公开exp注:

https://github.com/SecWiki/windows-kernel-exploits
https://github.com/WindowsExploits/Exploits
https://github.com/AusJock/Privilege-Escalation

—By Micropoor