exploit-db-mirror/exploits/windows/local/37768.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

24 lines
No EOL
907 B
Text

Source: https://github.com/monoxgas/Trebuchet
Trebuchet
MS15-076 (CVE-2015-2370) Privilege Escalation
Copies a file to any privileged location on disk
Compiled with VS2015, precompiled exe in Binary directory
Usage: trebuchet.exe C:\Users\Bob\Evil.txt C:\Windows\System32\Evil.dll
This is a lightly modified Proof of Concept by James Forshaw with Google, found here: https://code.google.com/p/google-security-research/issues/detail?id=325
CreateSymlink tool was written by James Forshaw found here: https://github.com/google/symboliclink-testing-tools
Notes:
Microsoft.VisualStudio.OLE.Inerop.dll must be in the same directory
Exploit can only be one once every 2-3 minutes. This is because RPC can be help up by LocalSystem
Tested on x64/x86 Windows 7/8.1
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37768.zip