关联漏洞
描述
A Zeek package to detect CVE-2022-23270, a PPTP vulnerability in Windows.
介绍
# CVE-2022-23270
A package to detect CVE-2022-23270, a vulnerability in Microsoft's PPTP implementation.
## Example
You can run this logic on the included PCAP in the `testing\traces` directory:
```
$ zeek -Cr CVE-2022-23270-exploited.pcap packages
$ cat notice.log
#separator \x09
#set_separator ,
#empty_field (empty)
#unset_field -
#path notice
#open 2022-05-10-23-03-47
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p fuid file_mime_type file_desc proto note msg sub src dst p n peer_descr actions email_dest suppress_for remote_location.country_code remote_location.region remote_location.city remote_location.latitude remote_location.longitude
#types time string addr port addr port string string string enum enum string string addr addr port count string set[enum] set[string] interval string string string double double
1652212222.744235 CHhAvVGS1DHFjwGM9 192.168.88.166 51143 192.168.88.157 1723 - - - tcp CVE202223270::CVE_2022_23270_Attempt Potential PPTP CVE-2022-23270 exploit attempt: 192.168.88.166 attempted exploit against 192.168.88.157 - 192.168.88.166 192.168.88.157 1723 - - Notice::ACTION_LOG (empty) 3600.000000 - - - - -
1652212222.744235 CHhAvVGS1DHFjwGM9 192.168.88.166 51143 192.168.88.157 1723 - - - tcp CVE202223270::CVE_2022_23270_Success PPTP CVE-2022-23270 exploit success: 192.168.88.166 exploited 192.168.88.157 - 192.168.88.166 192.168.88.157 1723 - - Notice::ACTION_LOG (empty) 3600.000000 - - - - -
#close 2022-05-10-23-03-47
```
## RFCs
- https://datatracker.ietf.org/doc/html/rfc2637
文件快照
[4.0K] /data/pocs/5004aba6c062724ca45529499d3f1add46881012
├── [1.5K] LICENSE
├── [1.5K] README.md
├── [4.0K] scripts
│ ├── [ 41] __load__.zeek
│ ├── [ 974] main.zeek
│ └── [ 420] signatures.sig
├── [4.0K] testing
│ ├── [4.0K] Baseline
│ │ └── [4.0K] cve202223270.run-pcap
│ │ ├── [ 746] conn.log
│ │ ├── [1.3K] notice.log
│ │ └── [ 115] output
│ ├── [ 565] btest.cfg
│ ├── [4.0K] cve202223270
│ │ └── [ 269] run-pcap.zeek
│ ├── [4.0K] Files
│ │ └── [ 192] random.seed
│ ├── [ 28] Makefile
│ ├── [4.0K] Scripts
│ │ ├── [ 383] diff-remove-timestamps
│ │ ├── [1.3K] get-zeek-env
│ │ └── [ 303] README
│ └── [4.0K] Traces
│ └── [5.8M] CVE-2022-23270-exploited.pcap
└── [ 315] zkg.meta
8 directories, 17 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。