Full title: Windows Net-NTLMv2 Reflection DCOM/RPC Exploit Category: local exploits Platform: windows This Metasploit module utilizes the Net-NTLMv2 reflection between DCOM/RPC to achieve a SYSTEM handle for elevation of privilege. Currently the module does not spawn as SYSTEM, however once achieving a shell, one can easily use incognito to impersonate the token. # 0day.today @ http://0day.today/