[local] NetBT e-Fatura - Privilege Escalation
ATT&CK techniques detected
T1068Exploitation for Privilege Escalation
96%
"[ local ] netbt e - fatura - privilege escalation # exploit title : netbt e - fatura - privilege escalation # author : seccops # discovery date : 2025 - 10 - 03 # vendor : https : / / net - bt. com. tr / e - fatura / # tested version : 2024 # tested on os : microsoft windows serv…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
36%
"\ users \ efatura > sc qc inboxprocessor [ sc ] queryserviceconfig success service _ name : inboxprocessor type : 10 win32 _ own _ process start _ type : 2 auto _ start error _ control : 1 normal binary _ path _ name : c : \ inetpub \ wwwroot \ inboxprocessor \ netbt. inbox. proc…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
NetBT e-Fatura - Privilege Escalation