Windows Net-NTLMv2 Reflection DCOM/RPC
Posted by deepcore on October 6, 2018 – 1:50 pm
This Metasploit module utilizes the Net-NTLMv2 reflection between DCOM/RPC to achieve a SYSTEM handle for elevation of privilege. Currently the module does not spawn as SYSTEM, however once achieving a shell, one can easily use incognito to impersonate the token.
Post a reply
You must be logged in to post a comment.