[ WORK FLOW - CONFIG REQUIRED SETTINGS ] 'GET_SYSTEM' allows users to elevate current session (client) to nt authority/system
[ WORK FLOW - CONFIG REQUIRED SETTINGS ] 'MSI_ESCALATION' allows users to CHECK/SET 'AlwaysInstallElevated' registry keys remottly...
If the reg key its allready set to dword:1 in target system, then this funtion will warn attacker
that the bypass its allready active. (so no further need to change reg key data again).
[ WORK FLOW - CONFIG REQUIRED SETTINGS ] 'REVERT_PRIVS' allows users to set 'AlwaysInstallElevated' registry keys to default (dword:0)
[ MODULE ERROR REPORTS ]
New metasploit release have changed the class name to use 'MetasploitModule' so
if you are seeing this display it means that your metasploit its using an old class name.
To fix this display just edit one of metasploit module and check what class name
your version its using, then replace in my module the (class MetasploitModule)...
[ POST - MODULE LIMITATIONS ]
Thismoduleonlyrunsagaintswindowssystems(nativecmdsyntax)Aspartofpost-exploitationclassthismodulerequiresoneopensessionThismoduleonlyrunsinameterpretershellenviroment(meterpreterclient)"Target system needs to be reboot for the registry changes take effect"...
[ MSI_PRIVILEGE_ESCALATION ]
Version: 1.3 Author: pedr0 Ubuntu [ r00t-3xp10it ]
Hosted By: peterubuntu10[at]sourceforge[dot]net
http://sourceforge.net/projects/msf-auxiliarys/
https://sourceforge.net/p/msf-auxiliarys/repository/ci/master/tree/MSI_privilege_escalation.rb
[ MODULE DESCRIPTION ]
[ MODULE ADVANCED OPTIONS ]
[ WORK FLOW - CONFIG REQUIRED SETTINGS ]
'GET_SYSTEM' allows users to elevate current session (client) to nt authority/system
[ WORK FLOW - CONFIG REQUIRED SETTINGS ]
'MSI_ESCALATION' allows users to CHECK/SET 'AlwaysInstallElevated' registry keys remottly...
If the reg key its allready set to dword:1 in target system, then this funtion will warn attacker
that the bypass its allready active. (so no further need to change reg key data again).
[ WORK FLOW - CONFIG REQUIRED SETTINGS ]
'REVERT_PRIVS' allows users to set 'AlwaysInstallElevated' registry keys to default (dword:0)
[ MODULE ERROR REPORTS ]
New metasploit release have changed the class name to use 'MetasploitModule' so
if you are seeing this display it means that your metasploit its using an old class name.
To fix this display just edit one of metasploit module and check what class name
your version its using, then replace in my module the (class MetasploitModule)...
[ POST - MODULE LIMITATIONS ]
[ PORT MODULE TO METASPLOIT DATABASE ]
[ LOAD - USE MODULE ]
[ CREDITS ]
Suspicious Shell Activity - RedTeam develop @2016
[ VIDEO TUTORIAL ]
Last edit: pedro ubuntu 2016-08-30