SeLoadDriverPrivilege
Privilege escalation using the load and unload device drivers policy (SeLoadDriverPrivilege).
Exploitation
Run the following command to see if the privilege is enabled:
whoami /privRegardless of if SeLoadDriverPrivilege is enabled or not, we can run the following tool automagically enable the SeLoadDrivierPrivilege, create a registry key under HKEY_CURRENT_USER and execute NTLoadDriver.
Once we have successfully loaded our Capcom.sys driver onto the machine we can abuse the malicious driver to escalate our privleges. The following are exploits I've used in my test environment and have verified working:
This privilege is extremely dangerous to assign to any user and I have seen multiple organizations assign it to every user.
References
Last updated