|
|
@ -72,6 +72,29 @@ on this. Up to the curious reader to develop this further. |
|
|
|
The utility `cab_parser.py` can be used to see the headers of the exploit file, but don't consider this a full |
|
|
|
The utility `cab_parser.py` can be used to see the headers of the exploit file, but don't consider this a full |
|
|
|
parser. It's a very quick and dirty CAB header viewer I developed to understand what was going on. |
|
|
|
parser. It's a very quick and dirty CAB header viewer I developed to understand what was going on. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Install |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The generator is designed to work on Windows, as it uses the `makecab` utility. Before usage, be sure to install required dependencies: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* With Virtualenv |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
``` |
|
|
|
|
|
|
|
git clone https://github.com/klezVirus/CVE-2021-40444 |
|
|
|
|
|
|
|
cd CVE-2021-40444 |
|
|
|
|
|
|
|
pip install virtualenv |
|
|
|
|
|
|
|
python -m virtualenv venv |
|
|
|
|
|
|
|
venv\Scripts\activate.bat |
|
|
|
|
|
|
|
pip install -r requirements |
|
|
|
|
|
|
|
``` |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* Without Virtualenv |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
``` |
|
|
|
|
|
|
|
git clone https://github.com/klezVirus/CVE-2021-40444 |
|
|
|
|
|
|
|
cd CVE-2021-40444 |
|
|
|
|
|
|
|
pip install -r requirements |
|
|
|
|
|
|
|
``` |
|
|
|
|
|
|
|
|
|
|
|
# Usage |
|
|
|
# Usage |
|
|
|
|
|
|
|
|
|
|
|
The generator is trivial to use, and has been tested with a number of different DLL payloads. |
|
|
|
The generator is trivial to use, and has been tested with a number of different DLL payloads. |
|
|
|