Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Workaround: physical read primitive failed! #11

Open
azcgithub opened this issue Dec 6, 2024 · 0 comments
Open

Workaround: physical read primitive failed! #11

azcgithub opened this issue Dec 6, 2024 · 0 comments

Comments

@azcgithub
Copy link

azcgithub commented Dec 6, 2024

image

I received this error when attempting to run the Smb_Ghost.py script on a Kali Linux 2024.3 machine against a Windows 10 ver. 1903 build 18362.356 machine.

As it turns out, despite CVE-2020-0796 including build 18362.356 as a vulnerable version, this build is not susceptible to this specific exploit script. This is apparently true for other 1903 builds as well.

However, I can confirm that this exploit script does work on Windows 10 ver. 1903 build 18362.30. I used an image downloaded from https://archive.org/details/Win10_1903_V1_English_x64. The only configurations made after installation was disabling the firewall.

Windows 10 1903 18362.30 / IP information
image
image

Exploit confirmation
image

I am a noob and this took longer than I'd like to admit to figure out. Hopefully it saves other people in my shoes some time in the future.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant