Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
MzHmO committed Sep 4, 2024
1 parent 620f8f5 commit e62c0fd
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,5 +89,5 @@ This means that the system has LocalLaunch, RemoteLaunch, LocalActivation, Remot
### How to abuse
If you find a COM object that you can access on behalf of a low-privileged user, for example, you can abuse it as follows:
1. Create an instance and call the methods of that COM object to, for example, write an arbitrary file on behalf of the system
1. Create an instance and call the methods of that COM object to, for example, write an arbitrary file on behalf of the system. For example, you have found a COM object with a `DeployCmdShell()` method that runs on behalf of the `NT AUTHORITY\SYSTEM` account and you have `LaunchPermissions` and `AccessPermissions`. You can start this COM object, call the `DeployCmdShell()` method, and get code execution on behalf of the system.
2. Abuse DCOM authentication. For this, see [RemoteKrbRelay](https://github.com/CICADA8-Research/RemoteKrbRelay/tree/main)

0 comments on commit e62c0fd

Please sign in to comment.