-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
30 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,31 @@ | ||
# Windows10-EOP-Exploit | ||
# Windows-EOP-Exploit | ||
Latest working elevation of privilege exploit by Tavis Ormandy from Google's Project Zero Team | ||
|
||
Hey guys,here comes the EOP exploit for windows 10,although someone can deploy it for windows earlier versions also easily. | ||
|
||
The direct link for details are: | ||
https://bugs.chromium.org/p/project-zero/issues/detail?id=1859 | ||
|
||
Note:-Below exploit works on Windows10 | ||
|
||
Steps: | ||
1.open ctftool.exe | ||
2.Type: | ||
connect | ||
script .\scripts\ctf-consent-system.ctf or .\scripts\ctf-logonui-system.ctf | ||
|
||
3.Boom !! after a few second you will get system privileged CMD. | ||
|
||
4.In the script:1.ctf-consent-system.ctf | ||
A uac prompt will open and soon a cmd opens with system privilege in your existing session. | ||
|
||
2.ctf-logonui-system.ctf | ||
Your session will logout and and a cmd opens with system privilege at logon screen which you can use to break administrator password. | ||
|
||
|
||
xxxxxxxxxxxxxxxxx I have also tested the exploit and it works with no trouble xxxxxxxxxxxxxxxxxxxxxxxxxxxxx | ||
|
||
A video demonstration by the Genius Tavis Ormandy:- | ||
|
||
https://www.youtube.com/watch?v=JUbac3OLPaM | ||