Skip to content

A version of the exploit explained under CORE-2011-0203 including a driver to read and write kernel memory

Notifications You must be signed in to change notification settings

leonsodhi/hyperv-vswitch-vulnerability

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Hyper-V vswitch Vulnerability

A version of the exploit explained under CORE-2011-0203 including a driver to read and write kernel memory.

Usage

Compile the driver using the Windows DDK, load it using OSRLOADER, tweak the exploit as needed (the memory addr for the exploit has been hard coded as I think the find pattern function sometimes failed but you can uncomment it if needed). Finally, build the app and run it (no params required).

If all goes well, when you go to reboot or shutdown the VM it will hang and even the Hyper-V management console won't be able to kill it.

About

A version of the exploit explained under CORE-2011-0203 including a driver to read and write kernel memory

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published