Exploiting Privileged Read/Write/Delete

Read

Write

Another technique found by sailay1996 is to place a DLL as C:\Windows\System32\wbem\tzres.dll and then run systeminfo . This will give a shell as NetworkService which can be turned into a SYSTEM shell with NetworkServiceExploit . Additional techniques can be found here .

Delete

Last updated