- Download this powershell script and save it
39719.ps1
. - Open an unprivileged powershell terminal.
- Go to the folder location where you saved the script.
- Source the script:
. .\39719.ps1
. - Then type
Invoke-MS16-032
. - Let the magic happens, you just got a nt authority\system
cmd.exe
.
I tested it on Windows Server 2012 R2 Datacenter Edition 64 bits but author tested it on others Windows.
You can read more about:
- the exploit on Exploit Database,
- MS16-032 on Google Project Zero.
Script infos:
- Author: Ruben Boonen (@FuzzySec)
- Blog: http://www.fuzzysecurity.com/
- License: BSD 3-Clause
- Required Dependencies: PowerShell v2+
- Optional Dependencies: None