Windows Net-NTLMv2 Reflection DCOM/RPC

Discussion in 'News Aggregator' started by Packet Storm, 6 Oct 2018.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module utilizes the Net-NTLMv2 reflection between DCOM/RPC to achieve a SYSTEM handle for elevation of privilege. Currently the module does not spawn as SYSTEM, however once achieving a shell, one can easily use incognito to impersonate the token.

    Continue reading...
     

Share This Page

Loading...