🎫
Fuse
  • Fuse
    • Summary
  • Enumeration
    • TCP
    • UDP
    • Web Services
      • Nikto
      • Dirb Extensions
      • Dirsearch
      • goBuster
      • Robots
      • WhatWeb
    • Other Services
      • DNS
      • MSRPC
      • Kerberos
      • LDAP
      • SMB
    • Authenticated Enumeration
      • DNS
      • MSRPC
      • Kerberos
      • LDAP
      • SMB
  • Exploitation
  • Priv Escalation
  • Notes
Powered by GitBook
On this page

Priv Escalation

PreviousExploitationNextNotes

Last updated 2 years ago

AWK7335736
AWL7637858
AWK7368638
ARL4462545
AWL5424525
AWK3625245
*Evil-WinRM* PS C:\Departments\IT\dr> cat offsite_dr_invocation.txt

contact: mark allory
building pin: 12443231
new joiner

Bridget Nielson
bnielson
Fabricorp01

SeLoadDriverPrivilege

With this privielge we can basically run a vulnerable driver and exploit it.

Following this github's instructions I was able to load a driver and exploit it to launch a reverse shell as system.

GitHub - k4sth4/SeLoadDriverPrivilege: Windows Privilege EscalationGitHub
Logo