module

Service Tracing Privilege Elevation Vulnerability

Disclosed
Feb 11, 2020
Created
May 7, 2020

Description

This module leverages a trusted file overwrite with a DLL hijacking
vulnerability to gain SYSTEM-level access on vulnerable Windows 10 x64
targets.

Authors

itm4n
bwatters-r7

Platform

Windows

Architectures

x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/local/cve_2020_0668_service_tracing
msf exploit(cve_2020_0668_service_tracing) > show targets
...targets...
msf exploit(cve_2020_0668_service_tracing) > set TARGET < target-id >
msf exploit(cve_2020_0668_service_tracing) > show options
...show and set options...
msf exploit(cve_2020_0668_service_tracing) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.