Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43217 PoC — Windows Encrypting File System (EFS) Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows Encrypting File System (EFS) Remote Code Execution Vulnerability (CVE-2021-43217)
Description:Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
Readme
# EFS Bypass Vulnerability_CVE-2021-43217
## Objective
This vulnerability demonstration aimed to establish a controlled environment for simulating an EFS bypass on windows 10 through Kali Linux. The primary focus was to perform a vulnerability pentration and show the possiblity of controlling a desktop through EFS's weakpoint.

### Skills Learned
- Advanced understanding of EFS
- Proficiency in Kali Linux
- Ability to generate python3 script and shellcodes (listed as Apicture)
- Ability to use MSFconsole and metasploit expliots, meterpreter and reverse_tcp

### Tools Used
- Windows EFS
- Windows 10
- Kali Linux

## Steps
https://github.com/JolynNgSC/EFS_CVE-2021-43217/assets/164031233/34679c13-5c89-4e77-a74f-e4e4f2616b0f

## Steps to Prevent 
Do not click on suspicious links that are sent from unknown sources. Have organisation documents be uploaded into the cloud and do not rely on EFS solely to prevent any attacks.
File Snapshot

[4.0K] /data/pocs/bfca0821db61b7177ad41009b11e577c326cb4e8 └── [ 931] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →