Hola compañeros Feliz año
donde puedo encontrar este exploit ,, he buscado por varias web pero son versiones anteriores
-en el caso de tenerlo el comando seria el siguiente (archivo.py) ip port???
MS14-066
The remote Windows host is affected by a remote code execution vulnerability due to improper processing of packets by the Secure Channel (Schannel) security package. An attacker can exploit this issue by sending specially crafted packets to a Windows server.
Comprueba si es este: https://github.com/anexia-it/winshock-test
Saludos.
gracias por contestar ese es un simple test para ver si el vulnerable
Testing 200.155.127.77:3389 for availability of SSL ciphers added in MS14-066...
Testing cipher DHE-RSA-AES256-GCM-SHA384:
UNSUPPORTED
Testing cipher DHE-RSA-AES128-GCM-SHA256: UNSUPPORTED
Testing cipher AES256-GCM-SHA384: UNSUPPORTED
Testing cipher AES128-GCM-SHA256: UNSUPPORTED
Checking if target system is running Windows Server 2012 or later...
Testing cipher ECDHE-RSA-AES256-SHA384: UNSUPPORTED
Testing cipher ECDHE-RSA-AES256-SHA: SUPPORTED
ip Patched No