SeManageVolumePrivilege
Original repo at https://github.com/xct/SeManageVolumeAbuse
Forked to: https://github.com/amandaguglieri/SeManageVolumeAbuse.git
Source for explotation: https://hackfa.st/Offensive-Security/Windows-Environment/Privilege-Escalation/Token-Impersonation/SeManageVolumePrivilege/#exploit-with-wertrigger
Step 1: Check current user privileges
- Verify if the current user has
SeManageVolumePrivilege
:
Step 2: Enable SeManageVolumePrivilege (optional)
- Download the
EnableAllTokenPrivs.ps1
script:
-
Transfer the script to the target machine:
-
Import the module to enable the privilege
- Verify privileges again to confirm that
SeManageVolumePrivilege
is enabled:
Step 3: DLL hijacking with Metasploit
- Download and transfer
SeManageVolumeExploit.exe
to the target:
- Transfer it using
certutil
:
- Execute the exploit to gain write privileges to
C:\Windows\System32\
:
- Create a malicious DLL payload with
msfvenom
:
- Place the malicious DLL in the WBEM directory:
- Set up a Netcat listener on the attacking machine:
- Activate the payload by running: