asus-asio2-lpe-exploit
asus-asio2-lpe-exploit copied to clipboard
Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)
Asus AsIO2 LPE exploit, based on rewolf-msi-exploit
Blog posts:
- Research: https://syscall.eu/blog/2020/03/30/asus_gio/
- Exploitation: http://syscall.eu/blog/2020/04/04/asus_gio_exploit/
This exploit is an extension of ReWolf's exploit More info can be found here: http://blog.rewolf.pl/blog/?p=1630
Fork notes by Raphaël Rigo
- patched the C++ code to support compilation with MinGW
- added a Makefile
- added a provider for AsIO2
- added EPROCESS Token offset for recent Windows versions
Compilation under Linux
- Install MinGW64:
apt install mingw-w64
- run
make
inMsiExploit
folder
Compilation under Windows
- install python, make sure it's in your path
- pip install cryptodome
- run
nmake -f Makefile.nmake
inMsiExploit
folder