Recent privilege escalation exploits for Windows 8.1 64 bits (2016-2018)
up vote
-2
down vote
favorite
My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.
Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.
windows exploit
add a comment |
up vote
-2
down vote
favorite
My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.
Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.
windows exploit
If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58
add a comment |
up vote
-2
down vote
favorite
up vote
-2
down vote
favorite
My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.
Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.
windows exploit
My question is more specific. I have a reverse Shell in a Windows 8.1 64-bits machine. Is there an exploit which escalates privileges in the same Shell, without creating a new window? I mean, in a similar way that the MS11-046 worked, where the SYSTEM shell spawns within the invoking shell/process.
Is there any exploit which already does this? I am trying to update the CVE 2017-0213 code without success, i am still fighting with Visual Studio 2017. Also, if you know of other exploit which could be updated to spawn the SYSTEM Shell in the already existing Shell, i would give you the 5 starts too.
windows exploit
windows exploit
asked Nov 10 at 23:17
ri ru
21
21
If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58
add a comment |
If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58
If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58
If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58
add a comment |
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53244360%2frecent-privilege-escalation-exploits-for-windows-8-1-64-bits-2016-2018%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
If anyone was wondering, MS17-017 Works that way. Thank you for the downvote ;)
– ri ru
Nov 11 at 13:58