Recent privilege escalation exploits for Windows 8.1 64 bits (2016-2018)









up vote
-2
down vote

favorite












My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.



Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.










share|improve this question





















  • If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
    – ri ru
    Nov 11 at 13:58














up vote
-2
down vote

favorite












My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.



Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.










share|improve this question





















  • If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
    – ri ru
    Nov 11 at 13:58












up vote
-2
down vote

favorite









up vote
-2
down vote

favorite











My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.



Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.










share|improve this question













My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.



Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.







windows exploit






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 10 at 23:17









ri ru

21




21











  • If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
    – ri ru
    Nov 11 at 13:58
















  • If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
    – ri ru
    Nov 11 at 13:58















If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58




If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58

















active

oldest

votes











Your Answer






StackExchange.ifUsing("editor", function ()
StackExchange.using("externalEditor", function ()
StackExchange.using("snippets", function ()
StackExchange.snippets.init();
);
);
, "code-snippets");

StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "1"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53244360%2frecent-privilege-escalation-exploits-for-windows-8-1-64-bits-2016-2018%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown






























active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes















 

draft saved


draft discarded















































 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53244360%2frecent-privilege-escalation-exploits-for-windows-8-1-64-bits-2016-2018%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







這個網誌中的熱門文章

How to read a connectionString WITH PROVIDER in .NET Core?

In R, how to develop a multiplot heatmap.2 figure showing key labels successfully

Museum of Modern and Contemporary Art of Trento and Rovereto