Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/misc/gh0st.md
Views: 11789
Vulnerable Application
This module exploits a buffer overflow in the Gh0st Controller when handling a drive list as received by a victim. This vulnerability can allow remote code execution in the context of the user who ran it.
A vulnerable version of the software is available here: gh0st 3.6
Verification Steps
Run the application
Start msfconsole
Do:
use exploit/windows/misc/gh0st
Do:
set rhost [ip]
Do:
exploit
Get a shell
Options
MAGIC
This is the 5 character magic used by the server. The default is Gh0st