Skip to content

Latest commit

 

History

History
32 lines (23 loc) · 1.34 KB

File metadata and controls

32 lines (23 loc) · 1.34 KB

VirIT-Explorer-LPE-Arbitrary-Code-Execution

A proof of concept for VirIT Explorer (Lite & Pro) <=v.8.1.68 Local Privilege Escalation (System)/Arbitrary Code Execution

How to Use

Add Admin:

-In ServiceMain comment the line 91: Spawn_Shell(); and de-comment the line 92: Add_Admin();
-decomment the while line 95-97
-change Add_Admin() function line 59 replacing VoidSec with your chosen username and replace secret with your chosen password
-compile the file as viritsvc.exe
-replace the viritsvc.exe located at C:\VEXPLite on the target machine
-reboot
-it will spawn a new admin account on login screen

Preview

Spawn Reverse Shell:

-generate a Meterpreter reverse payload (windows/meterpreter/reverse_tcp) and replace the content of the var r_shell[]
-start a Meterpreter handler to catch the reverse shell
-compile the file as viritsvc.exe
-replace the viritsvc.exe located at C:\VEXPLite on the target machine
-reboot
-it will spawn a reverse shell in ~5 minutes

Preview

Vulnerability

I've made this blog post explaining the vulnerability. Video Poc here