Windows 远程漏洞利用工具总览分析 – 绿盟科技技术博客
Tags
attack-pattern: | Exploits - T1587.004 Exploits - T1588.005 Server - T1583.004 Server - T1584.004 |
Common Information
Type | Value |
---|---|
UUID | c3523503-67e1-4913-8c44-3a2fc6924567 |
Fingerprint | 7aabc955783455b2 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | May 2, 2017, 4:20 p.m. |
Added to db | Jan. 18, 2023, 7:37 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Windows 远程漏洞利用工具总览分析 |
Title | Windows 远程漏洞利用工具总览分析 – 绿盟科技技术博客 |
Detected Hints/Tags/Attributes | 29/1/18 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://blog.nsfocus.net/overview-windows-remote-vulnerability-tools/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | createreplay.py |
|
Details | Domain | 3 | fb.py |
|
Details | Domain | 1 | remotedump.py |
|
Details | Domain | 1 | replaywizard.py |
|
Details | Domain | 34 | packetstormsecurity.com |
|
Details | Domain | 4128 | github.com |
|
Details | File | 1 | configure_lp.py |
|
Details | File | 1 | createreplay.py |
|
Details | File | 4 | fb.py |
|
Details | File | 1 | remotedump.py |
|
Details | File | 1 | replaywizard.py |
|
Details | File | 1 | start.jar |
|
Details | File | 1 | start_lp.py |
|
Details | File | 1 | 通过执行fb.py |
|
Details | File | 1 | mswinsmb-exec.rb |
|
Details | Github username | 6 | countercept |
|
Details | Url | 1 | https://packetstormsecurity.com/files/142181/mswinsmb-exec.rb.txt |
|
Details | Url | 2 | https://github.com/countercept/doublepulsar-detection-script |