POC详情: 0f186a79892b480577370224b46c6d695a2565ab

来源
关联漏洞
标题: Microsoft NLA安全功能规避漏洞 (CVE-2015-0006)
描述:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。Network Location Awareness(NLA)是其中的一个网络位置感知服务。 Microsoft NLA服务可能会无意中放松防火墙策略和/或某些服务的配置,而安全功能规避漏洞正是存在于该服务中。 这可能会增加暴露给攻击者的表面。当NLA服务无法正确验证域连接的计算机已连接到域还是连接到不可信的网络时,就会导致该漏洞。以下产品和版本受到影响:Microsoft Windows Server 2003
描述
Proof of concept for CVE-2015-0006. Fixed in MS15-005 https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-005 .
介绍
# IMPOSTER

A pentest tool used to attack windows clients on rogue networks.

## Current version

###Features

* Downgrade LDAP to NTLM authentication
* Fake initial steps of an domain controller to fool Network Location Awareness

### Servers
DNS, CLDAP, LDAP

## Setup

The current version have been tested on Kali Linux but should on other operating systems as well.

### Dependencies

* pyasn1
* dnspython

### Quick setup on Kali Linux
Use the following steps to setup imposter on a Kali Linux machine.
```
git clone https://github.com/bugch3ck/imposter.git
cd imposter/src
git clone https://github.com/rthalley/dnspython.git
ln -s dnspython/dns dns
apt-get install pyasn1
```

## Changelog

### Version 0.1
Private release 2014-06-05. Implements DNS, CLDAP and LDAP. Can downgrade LDAP bind to use NTLM and fake successful authentication to trick Network Location Awareness to set the domain policy.
文件快照

[4.0K] /data/pocs/0f186a79892b480577370224b46c6d695a2565ab ├── [ 906] README.md └── [4.0K] src ├── [1.8K] imposter.py ├── [1.5K] mscldap_server.py ├── [2.4K] mscldap_utils.py ├── [2.1K] msdns_server.py ├── [3.1K] msldap_server.py ├── [2.5K] msldap_utils.py ├── [4.0K] ntlm.py ├── [4.0K] proto │   ├── [ 56] cldap.py │   ├── [ 0] __init__.py │   ├── [ 23] ldap.py │   ├── [ 658] rfc1798.py │   └── [ 22K] rfc2251.py └── [ 112] servers.py 2 directories, 14 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。