tandasat / ExploitCapcom

This is a standalone exploit for a vulnerable feature in Capcom.sys
MIT License
282 stars 92 forks source link

Question about metasploit #5

Open ghost opened 3 years ago

ghost commented 3 years ago

the only capcom related exploit of metasploit is this https://www.rapid7.com/db/modules/exploit/windows/local/capcom_sys_exec/

is it possible to add a meterpreter payload to this exploit? for example when I compile and run this exploit I get a cmd (SYSTEM) from windows, so instead of running the windows cmd, how do i get it to run a meterpreter payload?

kkent030315 commented 3 years ago

Actually there's no difference between this repo and exploit/windows/local/capcom_sys_exec since both does privilege elevation. Therefore I don't see any reason to make meterpreter payload for this repo, am I wrong?

gabriel-maxx commented 3 years ago

Actually there's no difference between this repo and exploit/windows/local/capcom_sys_exec since both does privilege elevation. Therefore I don't see any reason to make meterpreter payload for this repo, am I wrong?

hello it's me, what i meant is if you could update this one: https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/local/capcom_sys_exec.rb

You said that there is no difference between the two, but the only one that works is this one, what I mentioned above doesn't work, I wanted to use the meterprer payload, understand? I tested both on windows 11, metasploit doesn't work, only this one