module

Windows unmarshal post exploitation

Disclosed
Aug 5, 2018
Created
Mar 19, 2019

Description

This module exploits a local privilege escalation bug which exists
in Microsoft COM for Windows when it fails to properly handle serialized objects.

Authors

Nicolas Joly
Matthias Kaiser
Sanjay Gondaliya
Pratik Shah pratik@notsosecure.com

Platform

Windows

Architectures

x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use post/windows/escalate/unmarshal_cmd_exec
msf post(unmarshal_cmd_exec) > show actions
...actions...
msf post(unmarshal_cmd_exec) > set ACTION < action-name >
msf post(unmarshal_cmd_exec) > show options
...show and set options...
msf post(unmarshal_cmd_exec) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.