SeManageVolumePrivilege
Original repo at https://github.com/xct/SeManageVolumeAbuse
Forked to: https://github.com/amandaguglieri/SeManageVolumeAbuse.git
Source for explotation: https://hackfa.st/Offensive-Security/Windows-Environment/Privilege-Escalation/Token-Impersonation/SeManageVolumePrivilege/#exploit-with-wertrigger
Step 1: Check current user privileges
- Verify if the current user has
SeManageVolumePrivilege:
Step 2: Enable SeManageVolumePrivilege (optional)
- Download the
EnableAllTokenPrivs.ps1script:
-
Transfer the script to the target machine:
-
Import the module to enable the privilege
- Verify privileges again to confirm that
SeManageVolumePrivilegeis enabled:
Step 3: DLL hijacking with Metasploit
- Download and transfer
SeManageVolumeExploit.exeto the target:
- Transfer it using
certutil:
- Execute the exploit to gain write privileges to
C:\Windows\System32\:
- Create a malicious DLL payload with
msfvenom:
- Place the malicious DLL in the WBEM directory:
- Set up a Netcat listener on the attacking machine:
- Activate the payload by running: