From eeca72d39be63fccef650ead9463b6188ce9f227 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Tue, 2 Jul 2019 10:59:24 -0700 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 0d9effb7ae..ac0f3d52e9 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -121072,6 +121072,7 @@ "tyranid", "enigma0x3", "nyshone69", + "lokiuox", "Carter Brainerd (cbrnrd)" ], "description": "There's a task in Windows Task Scheduler called \"SilentCleanup\" which, while it's executed as Users, automatically runs with elevated privileges.\n When it runs, it executes the file %windir%\\system32\\cleanmgr.exe. Since it runs as Users, and we can control user's environment variables,\n %windir% (normally pointing to C:\\Windows) can be changed to point to whatever we want, and it'll run as admin.", @@ -121093,7 +121094,7 @@ "targets": [ "Microsoft Windows" ], - "mod_time": "2019-06-27 11:38:16 +0000", + "mod_time": "2019-07-02 12:36:07 +0000", "path": "/modules/exploits/windows/local/bypassuac_silentcleanup.rb", "is_install_path": true, "ref_name": "windows/local/bypassuac_silentcleanup",