[prev in list] [next in list] [prev in thread] [next in thread]
List: metasploit-framework
Subject: Re: [framework] 0day Win 7/Vista UAC bypass and elevation
From: Lukas Kuzmiak <metasploit () backstep ! net>
Date: 2010-11-25 16:51:38
Message-ID: AANLkTikEGjQmbkwaX_0KqbWG6Us=mP3LywWeCs5hB3FB () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
Just tried on my work Win 7 ultimate, 32 bit, works just fine ;)
thx for nudge.
Only wimps use tape backup: _real_ men just upload their important stuff on
ftp, and let the rest of the world mirror it ;). Torvalds, Linus
(1996-07-20).
On Thu, Nov 25, 2010 at 4:06 PM, Miguel Rios <miguelrios35@yahoo.com> wrote:
> In case you haven't heard about the new exploit circulating out there,
> here <http://www.exploit-db.com/exploits/15609> it is on exploit-db.
>
>
> The original article has been taken down but there's a mirror \
> here<http://68.233.235.195/kmax/security-uac.aspx.htm>
> .
>
> Now to incorporate it into metasploit so we could choose our own binary or
> meterpreter shellcode to elevate would be sweet.
>
>
> _______________________________________________
> https://mail.metasploit.com/mailman/listinfo/framework
>
>
[Attachment #5 (text/html)]
Just tried on my work Win 7 ultimate, 32 bit, works just fine ;)<br><br>thx for \
nudge.<br><br clear="all">Only wimps use tape backup: _real_ men just upload their \
important stuff on ftp, and let the rest of the world mirror it ;). Torvalds, Linus \
(1996-07-20).<br>
<br><br><div class="gmail_quote">On Thu, Nov 25, 2010 at 4:06 PM, Miguel Rios <span \
dir="ltr"><<a href="mailto:miguelrios35@yahoo.com" \
target="_blank">miguelrios35@yahoo.com</a>></span> wrote:<br><blockquote \
class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, \
204, 204); padding-left: 1ex;">
<table border="0" cellpadding="0" cellspacing="0"><tbody><tr><td style="font: \
inherit;" valign="top">In case you haven't heard about the new exploit \
circulating out there, <a href="http://www.exploit-db.com/exploits/15609" \
target="_blank">here</a> it is on exploit-db.<br>
<br><br>The original article has been taken down but there's a mirror <a \
href="http://68.233.235.195/kmax/security-uac.aspx.htm" \
target="_blank">here</a>.<br><br>Now to incorporate it into metasploit so we could \
choose our own binary or meterpreter shellcode to elevate would be sweet.<br>
</td></tr></tbody></table><br>
<br>_______________________________________________<br>
<a href="https://mail.metasploit.com/mailman/listinfo/framework" \
target="_blank">https://mail.metasploit.com/mailman/listinfo/framework</a><br> \
<br></blockquote></div><br>
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic