CVE-2020-0668# CVE-2020-0668
powershell 实现,利用[printconfig.dll](https://github.com/Nan3r/writedacl2system/tree/master/printconfig.dll)来提权
[evil dll](https://github.com/Nan3r/dll/tree/master/common%20dll/run_programdata_setup.bat)可以自己定义,我这里的dll会执行c:\programdata\setup.bat文件
## Reference:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0668
https://itm4n.github.io/cve-2020-0668-windows-service-tracing-eop
## TODO:
1.利用RASPLAP服务提权 https://github.com/NotGlop/SysExec/blob/master/source/SysExec.cpp
2.利用RASMAN服务提权
[4.0K] /data/pocs/1795e07ff900f4f6edc2f4c1fb92ab16118f4ab3
├── [ 27K] CVE-2020-0668.ps1
├── [1.1M] NtApiDotNet.dll
├── [201K] poc.png
└── [ 621] README.md
0 directories, 4 files