[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Windows 8.1 - DCOM DCE/RPC Local NTLM Reflection Privilege Escalation (MS15-076) Exploit

Author
monoxgas
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-24042
Category
local exploits
Date add
14-08-2015
CVE
CVE-2015-2370
Platform
windows
Source: https://github.com/monoxgas/Trebuchet
 
Trebuchet
MS15-076 (CVE-2015-2370) Privilege Escalation
 
Copies a file to any privileged location on disk
 
Compiled with VS2015, precompiled exe in Binary directory
 
Usage: trebuchet.exe C:\Users\Bob\Evil.txt C:\Windows\System32\Evil.dll
 
This is a lightly modified Proof of Concept by James Forshaw with Google, found here: https://code.google.com/p/google-security-research/issues/detail?id=325
 
CreateSymlink tool was written by James Forshaw found here: https://github.com/google/symboliclink-testing-tools
 
Notes:
 
Microsoft.VisualStudio.OLE.Inerop.dll must be in the same directory
Exploit can only be one once every 2-3 minutes. This is because RPC can be help up by LocalSystem
Tested on x64/x86 Windows 7/8.1
 
Proof of Concept:
 
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37768.zip

#  0day.today [2024-11-16]  #