Skip to content

This vulnerability mainly affects Windows Server 2012/2016, Win8 / 8.1 and Win10 systems. An attacker could be modeled as an SMB server to induce a client to initiate an SMB request to trigger a vulnerability. Attackers can also "poison" SMB responses by middlemen, insert malicious SMB replies to achieve denial of service or control victim systems

Notifications You must be signed in to change notification settings

mostafahasseib/attack-win-10

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

attack-win-10

This vulnerability mainly affects Windows Server 2012/2016, Win8 / 8.1 and Win10 systems. An attacker could be modeled as an SMB server to induce a client to initiate an SMB request to trigger a vulnerability. Attackers can also "poison" SMB responses by middlemen, insert malicious SMB replies to achieve denial of service or control victim systems #how to use : python win10.py from('192.168.1.2',8080 ) whaterver the target ip and port : :::::::::::::::::::::::::::::::::::::::::::::::::::: :::::::::::::::::::::::::::::::::::::::::::::::::::::

::mrsentdex ::

:: mostafa mahmoud hasseib::

::Don’t use it on any device without prior permission of device owner::

About

This vulnerability mainly affects Windows Server 2012/2016, Win8 / 8.1 and Win10 systems. An attacker could be modeled as an SMB server to induce a client to initiate an SMB request to trigger a vulnerability. Attackers can also "poison" SMB responses by middlemen, insert malicious SMB replies to achieve denial of service or control victim systems

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages