[prev in list] [next in list] [prev in thread] [next in thread] 

List:       metasploit-framework
Subject:    Re: [framework] 0day Win 7/Vista UAC bypass and elevation
From:       Lukas Kuzmiak <metasploit () backstep ! net>
Date:       2010-11-25 16:51:38
Message-ID: AANLkTikEGjQmbkwaX_0KqbWG6Us=mP3LywWeCs5hB3FB () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Just tried on my work Win 7 ultimate, 32 bit, works just fine ;)

thx for nudge.

Only wimps use tape backup: _real_ men just upload their important stuff on
ftp, and let the rest of the world mirror it ;). Torvalds, Linus
(1996-07-20).


On Thu, Nov 25, 2010 at 4:06 PM, Miguel Rios <miguelrios35@yahoo.com> wrote:

> In case you haven't heard about the new exploit circulating out there,
> here <http://www.exploit-db.com/exploits/15609> it is on exploit-db.
> 
> 
> The original article has been taken down but there's a mirror \
>                 here<http://68.233.235.195/kmax/security-uac.aspx.htm>
> .
> 
> Now to incorporate it into metasploit so we could choose our own binary or
> meterpreter shellcode to elevate would be sweet.
> 
> 
> _______________________________________________
> https://mail.metasploit.com/mailman/listinfo/framework
> 
> 


[Attachment #5 (text/html)]

Just tried on my work Win 7 ultimate, 32 bit, works just fine ;)<br><br>thx for \
nudge.<br><br clear="all">Only wimps use tape backup: _real_ men just upload their \
important stuff on ftp, and let the rest of the world mirror it ;). Torvalds, Linus \
(1996-07-20).<br>


<br><br><div class="gmail_quote">On Thu, Nov 25, 2010 at 4:06 PM, Miguel Rios <span \
dir="ltr">&lt;<a href="mailto:miguelrios35@yahoo.com" \
target="_blank">miguelrios35@yahoo.com</a>&gt;</span> wrote:<br><blockquote \
class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, \
204, 204); padding-left: 1ex;">

<table border="0" cellpadding="0" cellspacing="0"><tbody><tr><td style="font: \
inherit;" valign="top">In case you haven&#39;t heard about the new exploit \
circulating out there, <a href="http://www.exploit-db.com/exploits/15609" \
target="_blank">here</a> it is on exploit-db.<br>

<br><br>The original article has been taken down but there&#39;s a mirror <a \
href="http://68.233.235.195/kmax/security-uac.aspx.htm" \
target="_blank">here</a>.<br><br>Now to incorporate it into metasploit so we could \
choose our own binary or meterpreter shellcode to elevate would be sweet.<br>

</td></tr></tbody></table><br>

      <br>_______________________________________________<br>
<a href="https://mail.metasploit.com/mailman/listinfo/framework" \
target="_blank">https://mail.metasploit.com/mailman/listinfo/framework</a><br> \
<br></blockquote></div><br>



_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic