Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2015-1701

Description

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

POC

Reference

- http://seclists.org/fulldisclosure/2020/May/34

- https://www.exploit-db.com/exploits/37049/

- https://www.exploit-db.com/exploits/37367/

- https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html

Github

- https://github.com/0xcyberpj/windows-exploitation

- https://github.com/0xpetros/windows-privilage-escalation

- https://github.com/55-AA/CVE-2015-0057

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Al1ex/WindowsElevation

- https://github.com/Anonymous-Family/CVE-2015-1701

- https://github.com/Anonymous-Family/CVE-2015-1701-download

- https://github.com/Ascotbe/Kernelhub

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CrackerCat/Kernel-Security-Development

- https://github.com/Cruxer8Mech/Idk

- https://github.com/Err0r-ICA/Pentest-Tips

- https://github.com/ExpLife0011/awesome-windows-kernel-security-development

- https://github.com/FULLSHADE/WindowsExploitationResources

- https://github.com/GhostTroops/TOP

- https://github.com/GrapeFruitWolfs/hei

- https://github.com/IAmAnubhavSaini/wes.py3

- https://github.com/IMCG/awesome-c

- https://github.com/JERRY123S/all-poc

- https://github.com/Micr067/K8tools

- https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources

- https://github.com/NitroA/windowsexpoitationresources

- https://github.com/NullArray/WinKernel-Resources

- https://github.com/Ondrik8/exploit

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Ratlesv/K8tools

- https://github.com/SeagullGR/k8-2019

- https://github.com/Shadowshusky/k8tool

- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries

- https://github.com/SoulSec/Resource-Threat-Intelligence

- https://github.com/TGbusWD/K8tools-20191130

- https://github.com/TamilHackz/windows-exploitation

- https://github.com/YSheldon/New

- https://github.com/amack3131/Devel

- https://github.com/ambynotcoder/C-libraries

- https://github.com/binkeys/k8tools

- https://github.com/blackend/Diario-RedTem

- https://github.com/cc8700619/K8

- https://github.com/code131415/code131415

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/d0703887/SINICA-IIS-SummerIntern

- https://github.com/fei9747/WindowsElevation

- https://github.com/gaearrow/windows-lpe-lite

- https://github.com/hfiref0x/CVE-2015-1701

- https://github.com/highandhigh/CVE-2015-0057

- https://github.com/hktalent/TOP

- https://github.com/howknows/awesome-windows-security-development

- https://github.com/ihebski/A-Red-Teamer-diaries

- https://github.com/jbmihoub/all-poc

- https://github.com/keshavskn123/CDAC

- https://github.com/liuhe3647/Windows

- https://github.com/loadbxh/K8tools

- https://github.com/lsc1226844309/hanker1

- https://github.com/lushtree-cn-honeyzhao/awesome-c

- https://github.com/lyshark/Windows-exploits

- https://github.com/nvwa-xt/spider

- https://github.com/pandazheng/Threat-Intelligence-Analyst

- https://github.com/pr0code/https-github.com-ExpLife0011-awesome-windows-kernel-security-development

- https://github.com/pravinsrc/NOTES-windows-kernel-links

- https://github.com/puckiestyle/A-Red-Teamer-diaries

- https://github.com/qiantu88/tools

- https://github.com/qq351188606/k8gege

- https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs

- https://github.com/renzu0/security-tools

- https://github.com/tronghieu220403/Common-Vulnerabilities-and-Exposures-Reports

- https://github.com/tufanturhan/Red-Teamer-Diaries

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/welove88888/k8

- https://github.com/whitfieldsdad/cisa_kev

- https://github.com/wyrover/win-sys

- https://github.com/ycdxsb/WindowsPrivilegeEscalation