Print Operators
Print Operators is another highly privileged group, which grants its members the
SeLoadDriverPrivilege. It give rights to manage, create, share, and delete printers connected to a Domain Controller, as well as the ability to log on locally to a Domain Controller and shut it down.
If we issue the command whoami /priv, and don't see the SeLoadDriverPrivilege from an unelevated context, we will need to bypass UAC:
By running a command shell as Administrator and entering the credentials of the user that is in the Print Operators Group
If we don't have a GUI, the UACMe repo features a comprehensive list of UAC bypasses, which can be used from the command line.
Attack 1: Manual with GUI
The driver
Capcom.syscontains functionality to allow any user to execute shellcode with SYSTEM privileges.
We can use our privileges to load this vulnerable driver and escalate privileges. We leverage this POC to enable the privilege as well as loading the driver for us.
First we must modify the POC to add the following includes:
#include <windows.h>
#include <assert.h>
#include <winternl.h>
#include <sddl.h>
#include <stdio.h>
#include "tchar.h"We transfer it to the target and compile it:
cl /DUNICODE /D_UNICODE exploit.cppNext, we download the Capcom.sys driver from here, and we save it to C:\temp.
Then we add a reference to this driver under our HKEY_CURRENT_USER tree:
Using Nirsoft's DriverView.exe, we can verify that the Capcom.sys driver is not loaded:
Then we run the exploit binary:
Now we can see that the driver is loaded:
To exploit the Capcom.sys, we can use the ExploitCapcom tool after compiling with it Visual Studio. We run it and it spawns a system shell:

Attack 2: Manual without GUI
We have to modify the ExploitCapcom.cpp code before compiling:
We edit line 292 and replace C:\\Windows\\system32\\cmd.exe" with, say, a reverse shell binary created with msfvenom, for example: c:\ProgramData\revshell.exe.
Everything else is like Attack 1.
Attack 3: Automated
We can use a tool such as EoPLoadDriver to automate the process of enabling the privilege, creating the registry key, and executing NTLoadDriver to load the driver. Before make sure to have uploaded the driver Capcom.sys
Then run:
Last updated