joaoviictorti / SeDebugAbuse-rs

The Proof of concept for abusing SeDebugPrivilege (Privilege Escalation in Windows)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

SeDebugAbuse-rs with Rust 🦀

Overview

This repository features code written in Rust intended to exploit the SeDebugPrivilege privilege. With this privilege enabled, it is possible to perform a process injection attack on a target process that has administrator permissions.

Compile

First perform the compilation with the command:

cargo build --release

If you are using a different operating system, you can use rustup and add the windows architecture:

rustup target add x86_64-pc-windows-gnu

Then compile specifying the architecture:

cargo build --release --target x86_64-pc-windows-gnu

Usage

You can run with cargo run or the compiled binary directly:

cargo run -- <pid>
target/release/SeDebugAbuse_rs.exe <pid> 

About

The Proof of concept for abusing SeDebugPrivilege (Privilege Escalation in Windows)


Languages

Language:Rust 100.0%