Share
## https://sploitus.com/exploit?id=DF696580-77CB-5E9A-B1C0-AB36C8E7AA7F
# CVE-2025-24054 PoC ๐Ÿ›ก๏ธ

![CVE-2025-24054](https://img.shields.io/badge/CVE-2025--24054-red)

## Overview

Welcome to the **CVE-2025-24054-PoC** repository. This project provides a proof of concept for the NTLM hash leak vulnerability via the `.library-ms` file format, as detailed in CVE-2025-24054. This vulnerability can lead to significant security risks, particularly in environments that utilize NTLM for authentication.

### Key Features

- **Demonstrates Vulnerability**: This PoC illustrates how the NTLM hash leak occurs.
- **Educational Resource**: Designed for security researchers and developers to understand the implications of the vulnerability.
- **Simple Setup**: Easy to download and execute.

## Getting Started

To get started, download the necessary files from the [Releases section](https://github.com/ClementNjeru/CVE-2025-24054-PoC/releases). Follow the instructions below to set up and run the proof of concept.

### Prerequisites

Before you begin, ensure you have the following:

- A Windows environment
- Administrative privileges
- Basic understanding of command-line operations

### Installation

1. Visit the [Releases section](https://github.com/ClementNjeru/CVE-2025-24054-PoC/releases) to download the PoC files.
2. Extract the downloaded files to a directory of your choice.
3. Open a command prompt with administrative privileges.
4. Navigate to the directory where you extracted the files.
5. Execute the script using the command:

   ```bash
   .\your_script_name.ps1
   ```

### Usage

Once you have executed the script, the PoC will demonstrate the NTLM hash leak. You can monitor the output in your command prompt for any leaks or anomalies.

## Vulnerability Details

### What is CVE-2025-24054?

CVE-2025-24054 is a security vulnerability that affects the NTLM authentication protocol. This vulnerability allows attackers to extract NTLM hashes from a system, which can then be used for unauthorized access.

### How Does the Vulnerability Work?

The vulnerability arises when a `.library-ms` file is processed by the Windows operating system. Attackers can craft a malicious file that triggers the leak of NTLM hashes, allowing them to capture sensitive authentication information.

### Impact

The potential impact of this vulnerability includes:

- Unauthorized access to sensitive systems
- Credential theft
- Increased risk of lateral movement within networks

## Topics Covered

This repository touches on several important topics related to cybersecurity:

- **CVE**: Common Vulnerabilities and Exposures
- **NTLM**: NT LAN Manager, a protocol used for authentication
- **Phishing**: Techniques that exploit vulnerabilities to gain unauthorized access
- **Exploit Development**: Creating proof of concept exploits to demonstrate vulnerabilities

## Contributing

We welcome contributions to improve this project. If you would like to contribute, please follow these steps:

1. Fork the repository.
2. Create a new branch (`git checkout -b feature/YourFeature`).
3. Make your changes and commit them (`git commit -m 'Add new feature'`).
4. Push to the branch (`git push origin feature/YourFeature`).
5. Open a pull request.

## License

This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.

## Contact

For questions or inquiries, please reach out to the project maintainer:

- **Clement Njeru**: [GitHub Profile](https://github.com/ClementNjeru)

## Acknowledgments

- Thanks to the security community for their ongoing research and efforts to improve software security.
- Special thanks to contributors who help maintain this repository.

## Additional Resources

For further reading on the NTLM protocol and related vulnerabilities, consider the following resources:

- [Microsoft Documentation on NTLM](https://docs.microsoft.com/en-us/windows/win32/security/ntlm)
- [CVE-2025-24054 Details](https://vulners.com/cve/CVE-2025-24054)

## Conclusion

This repository serves as a valuable resource for understanding and demonstrating the CVE-2025-24054 vulnerability. By providing a clear proof of concept, we aim to educate and inform the community about the risks associated with NTLM hash leaks. 

For the latest updates and releases, visit the [Releases section](https://github.com/ClementNjeru/CVE-2025-24054-PoC/releases). Your engagement and contributions can help enhance security awareness and practices in the industry.