From c9be68f0a128ea176107445108eca40a6b0a05d7 Mon Sep 17 00:00:00 2001 From: Swissky <12152583+swisskyrepo@users.noreply.github.com> Date: Thu, 8 Oct 2020 16:51:11 +0200 Subject: [PATCH] Privilege File Write - Update --- .../Windows - Privilege Escalation.md | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/Methodology and Resources/Windows - Privilege Escalation.md b/Methodology and Resources/Windows - Privilege Escalation.md index 7ad00d8..32b8d28 100644 --- a/Methodology and Resources/Windows - Privilege Escalation.md +++ b/Methodology and Resources/Windows - Privilege Escalation.md @@ -1029,12 +1029,11 @@ If we found a privileged file write vulnerability in Windows or in some third-pa > Weaponizing for privileged file writes bugs with Windows problem reporting -1. Copy `phoneinfo.dll` to `C:\Windows\System32\` -2. Place `Report.wer` file and `WerTrigger.exe` in a same directory. -3. Then, run `WerTrigger.exe`. -4. Enjoy a shell as **NT AUTHORITY\SYSTEM** - -https://github.com/sailay1996/WerTrigger +1. Clone https://github.com/sailay1996/WerTrigger +2. Copy `phoneinfo.dll` to `C:\Windows\System32\` +3. Place `Report.wer` file and `WerTrigger.exe` in a same directory. +4. Then, run `WerTrigger.exe`. +5. Enjoy a shell as **NT AUTHORITY\SYSTEM** ## EoP - Common Vulnerabilities and Exposure