From 3fc8621e163f5e13465e677d668debf8c76bfa11 Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Thu, 27 Jan 2022 16:42:06 +0100 Subject: [PATCH] Docs: Remove MS08_067 exploiter documentation --- README.md | 1 - docs/content/reference/exploiters/MS08-067.md | 14 -------------- 2 files changed, 15 deletions(-) delete mode 100644 docs/content/reference/exploiters/MS08-067.md diff --git a/README.md b/README.md index 1e9477ea9..6100219df 100644 --- a/README.md +++ b/README.md @@ -47,7 +47,6 @@ The Infection Monkey uses the following techniques and exploits to propagate to * SMB * WMI * Shellshock - * Conficker * Elastic Search (CVE-2015-1427) * Weblogic server * and more, see our [Documentation hub](https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/) for more information about our RCE exploiters. diff --git a/docs/content/reference/exploiters/MS08-067.md b/docs/content/reference/exploiters/MS08-067.md deleted file mode 100644 index d4eb3b807..000000000 --- a/docs/content/reference/exploiters/MS08-067.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "MS08 067" -date: 2020-07-14T08:42:54+03:00 -draft: false -tags: ["exploit", "windows"] ---- - -### Description - -[MS08-067](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067) is a remote code execution vulnerability. - -This exploiter is unsafe. It's therefore **not** enabled by default. - -If an exploit attempt fails, this could also lead to a crash in Svchost.exe. If a crash in Svchost.exe occurs, the server service will be affected. This may cause a system crash due to the use of buffer overflow.