# SeLoadDriverPrivilege

### Exploitation

Run the following command to see if the privilege is enabled:

```bash
whoami /priv
```

Regardless of if SeLoadDriverPrivilege is enabled or not, we can run the following tool automagically enable the SeLoadDrivierPrivilege, create a registry key under HKEY\_CURRENT\_USER and execute NTLoadDriver.

* [EoPLoadDriver](https://github.com/TarlogicSecurity/EoPLoadDriver/)

Once we have successfully loaded our `Capcom.sys` driver onto the machine we can abuse the malicious driver to escalate our privleges. The following are exploits I've used in my test environment and have verified working:

* [ExploitCapcom](https://github.com/tandasat/ExploitCapcom)
* [PuppetStrings](https://github.com/zerosum0x0/puppetstrings)

This privilege is extremely dangerous to assign to any user and I have seen multiple organizations assign it to *every* user.

### References

{% embed url="<https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/privileged-accounts-and-token-privileges>" %}

{% embed url="<https://www.tarlogic.com/blog/abusing-seloaddriverprivilege-for-privilege-escalation>" %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://ttp.parzival.sh/pentesting/infrastructure/privilege_escalation/windows/abusing-privileges/seloaddriverprivilege.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
