Projects STRLCPY CVE-2021-21551 Commits cb50d3e7
🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 3 lines
    4 4  SpoolPrinter Privesc using SeImpersonatePrivileges was made thanks to @_ForrestOrr https://github.com/forrest-orr/DoubleStar/tree/main/Payloads/Source/Stage3_SpoolPotato I basically just tossed the exploit function in his code and altered it ever so barely.
    5 5  NtQuerySystemInformation was taken from @Void_Sec https://voidsec.com/exploiting-system-mechanic-driver/ almost blatantly - cannot take ANY credit for how I leaked the Token location.
    6 6   
     7 +At this time we just provide an upgraded cmd.exe shell. If you want something else you'll have to edit the exploit yourself.
     8 + 
    7 9  All I did was merge the techniques to make a full privesc and toss in the "Fill in the blanks" from https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/
    8 10  Not much I can take credit for here! But in case you're wondering my twitter is @waldoirc
    9 11  This is my first public exploit ever.
    skipped 14 lines
Please wait...
Page is in error, reload to recover