Windows 远程漏洞利用工具总览分析 – 绿盟科技技术博客
Common Information
Type Value
UUID c3523503-67e1-4913-8c44-3a2fc6924567
Fingerprint 7aabc955783455b2
Analysis status DONE
Considered CTI value 0
Text language
Published May 2, 2017, 4:20 p.m.
Added to db Jan. 18, 2023, 7:37 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Windows 远程漏洞利用工具总览分析
Title Windows 远程漏洞利用工具总览分析 – 绿盟科技技术博客
Detected Hints/Tags/Attributes 29/1/18
Attributes
Details Type #Events CTI Value
Details Domain 1
createreplay.py
Details Domain 3
fb.py
Details Domain 1
remotedump.py
Details Domain 1
replaywizard.py
Details Domain 34
packetstormsecurity.com
Details Domain 4128
github.com
Details File 1
configure_lp.py
Details File 1
createreplay.py
Details File 4
fb.py
Details File 1
remotedump.py
Details File 1
replaywizard.py
Details File 1
start.jar
Details File 1
start_lp.py
Details File 1
通过执行fb.py
Details File 1
mswinsmb-exec.rb
Details Github username 6
countercept
Details Url 1
https://packetstormsecurity.com/files/142181/mswinsmb-exec.rb.txt
Details Url 2
https://github.com/countercept/doublepulsar-detection-script