Home / os / winmobile

Windows Net-NTLMv2 Reflection DCOM/RPC

Posted on 06 October 2018

This Metasploit module utilizes the Net-NTLMv2 reflection between DCOM/RPC to achieve a SYSTEM handle for elevation of privilege. Currently the module does not spawn as SYSTEM, however once achieving a shell, one can easily use incognito to impersonate the token.

 

TOP