Treadstone Security

http://treadstonesecurity.blogspot.com

Showing posts with label escalation. Show all posts
Showing posts with label escalation. Show all posts

Friday, December 5, 2014

MS14-068 Privilege Escalation PoC: Become Domain Administrator with Any User Account

https://twitter.com/bidord

http://www.reddit.com/r/netsec/comments/2ocf9s/pykek_ms14068_privilege_escalation_poc_become/

https://github.com/bidord/pykek
Posted by nonXero at 12:42 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: admin, code, escalation, exploit, microsoft, ms14-068, netsec, poc, privilege escalation, pykek, windows
Older Posts Home
Subscribe to: Posts (Atom)

Pages

  • Home
  • About
  • CrowdShield #bugbounty
  • Findsploit
  • MassBleed
  • Linux Privesc
  • Supermicro Scanner
  • TimThumb 0day
  • Screenshots
  • GridCrack
  • PoodleWalk
  • 1N3 | 1337day.com
  • 1N3 | packetstorm
  • 1N3 | bugcrowd
  • CrowdShield Bugbounty

Blog Archive

  • ▼  2015 (9)
    • ▼  November (1)
      • InjectX to Find XSS
    • ►  June (1)
    • ►  February (1)
    • ►  January (6)
  • ►  2014 (20)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  August (4)
    • ►  July (2)
    • ►  June (4)
    • ►  April (2)
    • ►  March (1)
    • ►  January (1)
  • ►  2013 (4)
    • ►  December (2)
    • ►  November (2)

Labels

exploit (19) 1N3 (11) poc (11) 2014 (8) script (8) 0day (7) remote (7) xss (7) crowdshield (6) ethical hacking (6) hacking (6) security (6) vulnerability (6) web (6) bounty (5) bug (5) linux (5) pentesting (5) bugbounty (4) code (4) crowd (4) pentest (4) scanner (4) tool (4) attack (3) buffer overflow (3) demo (3) ethical (3) execution (3) ftp (3) list (3) overflow (3) program (3) python (3) scan (3) tutorial (3) VM (2) buffer (2) crack (2) cracker (2) hacker (2) hackers (2) hak5 (2) heartbleed (2) local (2) login (2) openssl (2) owasp (2) privilege escalation (2) rce (2) wifi (2) windows (2) wordpress (2) 2015 (1) 2015-0235 (1) CVE-2015-0235 (1) GHOST (1) admin (1) advisory (1) algosec (1) all in one (1) anonymous (1) ap (1) application (1) attacks (1) badusb (1) brute (1) captcha (1) ccs (1) computer (1) cross (1) cross site request forgery (1) csrf (1) cve-2014-3566 (1) cyber (1) dnsspoof (1) email (1) escalation (1) exim (1) force (1) fuzzer (1) glibc (1) google (1) hash (1) hashes (1) infusion (1) john (1) lyris (1) mass (1) metasploit (1) microsoft (1) mitm (1) ms14-068 (1) myconnection server (1) netsec (1) network (1) nntp (1) open (1) pack (1) password (1) pc (1) penetration (1) pineapple (1) poodle (1) pwn (1) pykek (1) redirect (1) researcher (1) search (1) seo (1) server (1) shellcode (1) site (1) smtp (1) sourced (1) ssl (1) sslsplit (1) sslstrip (1) stored (1) supermicro (1) target (1) tcpdump (1) test (1) testing (1) timthumb (1) trace (1) tracing (1) unix (1) usb (1) v (1) whitehat (1) wireless (1) x86 (1) xst (1)
Simple theme. Powered by Blogger.