The next module we will run is Windows Escalate Service Permissions Local Privilege Escalation module, which is dated 2012. This is a local exploit, run through the running session. Again, we will use session 2.
To use this module, run the following command:
use exploit/windows/local/service_permissions
The description from the module is as follows:
msf > info exploit/windows/local/service_permissions Name: Windows Escalate Service Permissions Local Privilege Escalation Module: exploit/windows/local/service_permissions Platform: Windows Privileged: No License: Metasploit Framework License (BSD) Rank: Great Disclosed: 2012-10-15 Provided by: scriptjunkie Available targets: Id Name -- ---- 0 Automatic Basic options: Name Current...