Skip to content

Files

Latest commit

c25cb80 · Apr 26, 2017

History

History
This branch is 168 commits behind SecWiki/windows-kernel-exploits:master.

MS16-032

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
Apr 22, 2017
Apr 22, 2017
Apr 22, 2017
Apr 22, 2017
Apr 26, 2017

MS16-032

Vulnerability reference:

Targets

  • Windows x86
  • Windows x64

Usage of MS16-032.ps1

x86

x64

Windows 10

Win10


Use on msf

This module exploits the lack of sanitization of standard handles in Windows' Secondary Logon Service. The vulnerability is known to affect versions of Windows 7-10 and 2k8-2k12 32 and 64 bit. This module will only work against those versions of Windows with Powershell 2.0 or later and systems with two or more CPU cores.

 msf > use exploit/windows/local/ms16_032_secondary_logon_handle_privesc
 msf exploit(ms16_032_secondary_logon_handle_privesc) > show targets
        ...targets...
 msf exploit(ms16_032_secondary_logon_handle_privesc) > set TARGET <target-id>
 msf exploit(ms16_032_secondary_logon_handle_privesc) > show options
        ...show and set options...
 msf exploit(ms16_032_secondary_logon_handle_privesc) > exploit