Win Kernel Privesc
Get access to the target and gain a meterpreter session and then follow the following technique :-
#Local Privilege Escalation
Enumerate Windows Kernel vulnerabilities with Metasploit
Copy
This module exploits an uninitialized stack variable in the WMI subsystem of ntoskrnl
By using a kernel exploit for this specific version of Windows O.S., the attacker is able to get a
meterpreter
session with elevated privileges.
#Manual Privilege Escalation
Windows-Exploit-Suggester
Run the script
Copy
MS16-135
in this case I will use the pre-build executable
41015.exe
Knowing that the specific Windows version is vulnerable to this particular exploit, proceed with the exploitation
Use the meterpreter
access to upload the 41015.exe
file to the temp
directory within the Windows O.S.
Last updated