Jump to content

Recommended Posts

Posted

I am working on a payload for a switchblade. I want to be able to run the payload from any type of account; limited, guest, etc... I do not want to leave any obvious trace, like a newly created admin account, on the target machine.

Can anyone point me in the right direction to an app that will accomplish this and is executable from a USB device?

Posted
Local privilege escalation exploit required?

One I found quickly: http://www.milw0rm.com/exploits/1911

Well it seems like you have to change a value in the registry for that to work. And you can't do that if you're not an admin...

This is actually not an easy thing to do, there's not exactly tons of relevant local privilege escalation exploits for Windows. And those that do exist probably require specific prerequisites to work. Also they're definitely not generic, you'd have to customize the payload for each service pack version (or the specific program the exploit uses) the target computer is running.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...