-
Notifications
You must be signed in to change notification settings - Fork 2.9k
Windows Local Privilege Escalation Module #1230
base: dev
Are you sure you want to change the base?
Conversation
|
I will get an exception if I use this module thus no job is started. |
|
Hi there, I wasn't able to replicate this issue the agent name is used to grab the session ID so it should work. Here is where the session ID is set; Is the agent name valid? |
|
When I tested this it worked, but I have noticed an error on lines;
Can you replace |
|
replacing Thank you very much. // |
|
Same error as @Kruxinator, but your workaround is ok 👍 |
|
Mine didn't get detected by defender, I left safe checks as False by default which normally triggers the detection on Windows 10. Did you enable safe checks? Glad replacing the string worked for you both, I will update the files. |
|
Indeed, with Safecheck False, it's ok...well almost because now, I figure out that my VM seems to be patched against the exploit. EDIT : Just try on my unpatched lab, works like a charm, nice work. If I have some time, I'll looking for a solution to use native code instead of your .exe 🌻 |
|
Just tried it out.. keep getting this error:
I've tried it with SafeChecks True and False, no difference. |
|
Try killing spoolsv.exe |
|
@Clemenzah are you sure your system is vulnerable ? |

This is the Windows priv esc by SandboxEscaper I have converted it as best as I can to PowerShell and it now priv escs in empire giving you a SYSTEM shell back.
Things I want to tidy up on it are;
The source code for the TriggerXPSPrint.exe can be found at my repo here;
https://github.com/OneLogicalMyth/zeroday-powershell
Not my finest work, but it works. It gives the user a console popup for the TriggerXPSPrint.exe if you have an interactive low priv. It can be easily fingerprinted, but maybe that isn't such a bad thing until MS patch it. Feel free to improve it. 🙂 (edited)