Kernel-level privilege escalation
Understanding Kernel Exploitation
What Makes Kernel Exploits Viable
Automated Vulnerability Assessment
Windows Exploit Suggester
# Download and setup Windows Exploit Suggester
git clone https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git
cd Windows-Exploit-Suggester
# Update exploit database
python windows-exploit-suggester.py --update
# On target system, generate systeminfo
systeminfo > systeminfo.txt
# Transfer systeminfo.txt to attacker machine and analyze
python windows-exploit-suggester.py --database 2023-01-01-mssb.xls --systeminfo systeminfo.txt --ostext "windows 10" --patches KB4013081Sherlock PowerShell Enumeration
Metasploit Local Exploit Suggester
Tool-Based Kernel Exploitation
MS16-032 (Secondary Logon Handle)
MS16-135 (Win32k Elevation)
CVE-2021-1732 (Win32k Elevation)
CVE-2022-21882 (Win32k Elevation)
Framework Integration
Metasploit Kernel Exploit Workflow
Automated Target Assessment
System Information Gathering
Mitigation Detection
Tool Recommendations by Target
Windows 10 Targets
Legacy Windows Targets
Server Targets
Operational Considerations
When Kernel Exploits Are Worth Attempting
Risk Management
Last updated
Was this helpful?