Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/lucabarile/cve-2022-43293
Exploit and report for CVE-2022-43293
https://github.com/lucabarile/cve-2022-43293
0-day arbitrary-file-overwrite arbitrary-file-write cng-sys denial-of-service disclosure exploit impersonation link-following link-following-attack mount-point poc proof-of-concept symbolic-link vulnerability wacom wacom-vulnerability windows-denial-of-service write-up zero-day
Last synced: 12 days ago
JSON representation
Exploit and report for CVE-2022-43293
- Host: GitHub
- URL: https://github.com/lucabarile/cve-2022-43293
- Owner: LucaBarile
- License: mit
- Created: 2023-04-07T13:38:27.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-04-07T15:12:50.000Z (over 1 year ago)
- Last Synced: 2024-06-25T16:48:27.007Z (5 months ago)
- Topics: 0-day, arbitrary-file-overwrite, arbitrary-file-write, cng-sys, denial-of-service, disclosure, exploit, impersonation, link-following, link-following-attack, mount-point, poc, proof-of-concept, symbolic-link, vulnerability, wacom, wacom-vulnerability, windows-denial-of-service, write-up, zero-day
- Language: Batchfile
- Homepage: https://lucabarile.github.io/
- Size: 5.88 MB
- Stars: 0
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Exploits for CVE-2022-43293
To get a persistent Windows Denial of Service (as shown in the POC above), simply runExploit.bat
and enter%windir%\system32\cng.sys
when you're asked which file you want to overwrite.
Here you can find my Arbitrary File Write\Overwrite Vulnerability report.
Here you can understand how to use an Arbitrary File Write\Overwrite primitive to achieve a Windows Denial of Service.
Here you can buy me a unicorn 🦄
Share the Knowledge!