Exploiting Privileged Read/Write/Delete
Read
Write
https://github.com/sailay1996/WerTrigger (Tested 03/21)
https://github.com/itm4n/UsoDllLoader (Tested 03/21)
Another technique found by sailay1996 is to place a DLL as C:\Windows\System32\wbem\tzres.dll
and then run systeminfo
. This will give a shell as NetworkService which can be turned into a SYSTEM shell with NetworkServiceExploit . Additional techniques can be found here .
Delete
Last updated