Priv Escalation

AWK7335736
AWL7637858
AWK7368638
ARL4462545
AWL5424525
AWK3625245
*Evil-WinRM* PS C:\Departments\IT\dr> cat offsite_dr_invocation.txt

contact: mark allory
building pin: 12443231
new joiner

Bridget Nielson
bnielson
Fabricorp01

SeLoadDriverPrivilege

With this privielge we can basically run a vulnerable driver and exploit it.

Following this github's instructions I was able to load a driver and exploit it to launch a reverse shell as system.

Last updated