Subscribe via feed.

Microsoft Windows Net-NTLMv2 Reflection DCOM/RPC Privilege Escalation

Posted by deepcore on January 17, 2019 – 9:24 am

This Metasploit module utilizes the Net-NTLMv2 reflection between DCOM/RPC to achieve a SYSTEM handle for elevation of privilege. It requires a CLSID string.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.