A vulnerability exists within the Microsoft Server Message Block 3.1.1 (SMBv3) protocol that can be leveraged to execute code on a vulnerable server. This local exploit implementation leverages this flaw to elevate itself before injecting a payload into winlogon.exe.
b897523218de261b528a25b48e985e91f958585e7ae9753a0c897e339abe8503
Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit.
6264aca1e467841faf26e69f8666d2ab3b3b4382fd866c93ace48782ed2ba071