Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())
Switch branches/tags
Nothing to show
Clone or download
Latest commit 78862b0 Sep 28, 2018
Permalink
Failed to load latest commit information.
ALPC-TaskSched-LPE Add files via upload Sep 28, 2018
Bin-x64 Delete ALPC-TaskSched-LPE.exe Sep 28, 2018
Bin-x86 更新利用程序 Sep 28, 2018
ExpDLL/exploit Add files via upload Sep 28, 2018
Win2016LPE Add files via upload Sep 12, 2018
README.md Update README.md Sep 28, 2018

README.md

Win2016LPE

Windows10 & Windows Server 2016 LPE Exploit
(利用 schedsvc!SchRpcSetSecurity() 漏洞)

目录说明

bin-x86 为支持Win10 x86系统的Bin
bin-x64 为支持Win10 x64 、 Win2016系统的Bin
Win2016LPE 为提权主程序
ALPC-TaskSched-LPE 漏洞利用DLL
ExpDLL exploit dll 编译生成之后放置于ALPC-TaskSched-LPE\resource目录

更新历史

2018-09-28
1)由COM启动打印服务改为API启动,避免工具运行时的额外弹窗
2)去掉因进程间通讯造成的防火墙网络连接提示

感谢

感谢原作者SandboxEscaper的POC及漏洞writeup
https://github.com/SandboxEscaper/