The next module we will run is Windows Escalate Service Permissions Local Privilege Escalation module, which is dated 2012. This is a local exploit, run through the running session. Again, we will use session 2.
To use this module, run the following command:
use exploit/windows/local/service_permissions
The description from the module is as follows:
msf > info exploit/windows/local/service_permissions
Name: Windows Escalate Service Permissions Local Privilege Escalation
Module: exploit/windows/local/service_permissions
Platform: Windows
Privileged: No
License: Metasploit Framework License (BSD)
Rank: Great
Disclosed: 2012-10-15
Provided by:
scriptjunkie
Available targets:
Id Name
-- ----
0 Automatic
Basic options:
Name Current...