This Metasploit module will create a new session with SYSTEM privileges via the KiTrap0D exploit by Tavis Ormandy. If the session in use is already elevated then the exploit will not run. The module relies on kitrap0d.x86.dll and is not supported on x64 editions of Windows.
b61f14f2873aa1c647ab01600db74d813ae4c68913ed531266fd588ac8aff25a
Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()->KiTrap0d local ring0 exploit. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".
6a0ec1b7f7b4f802f1a7194731df55893de13da5d1130f531f16e715e4a747a4
Microsoft Windows suffers from an user mode to ring 0 escalation vulnerability.
7279c4aa557c7c62c2276ce4f89e53e2f9c65e8ca3f46f95eeaf08402da40da1