TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Exploit-DB

[local] NetBT e-Fatura - Privilege Escalation

2026-04-10 · Read original ↗

ATT&CK techniques detected

2 predictions
T1068Exploitation for Privilege Escalation
96%
"[ local ] netbt e - fatura - privilege escalation # exploit title : netbt e - fatura - privilege escalation # author : seccops # discovery date : 2025 - 10 - 03 # vendor : https : / / net - bt. com. tr / e - fatura / # tested version : 2024 # tested on os : microsoft windows serv…"
T1055.001Dynamic-link Library Injection
36%
"\ users \ efatura > sc qc inboxprocessor [ sc ] queryserviceconfig success service _ name : inboxprocessor type : 10 win32 _ own _ process start _ type : 2 auto _ start error _ control : 1 normal binary _ path _ name : c : \ inetpub \ wwwroot \ inboxprocessor \ netbt. inbox. proc…"

Summary

NetBT e-Fatura - Privilege Escalation