A number of metasploit modules already exist to escalate privileges based on insecurely installed services, such as the HP PML driver. But other services also suffer from the same problems and it is not worth making a new script for every obscure service; it would be easier to have one that could scan for such vulnerabilities and exploit them automatically. And thankfully, the new railgun extension can help us out. All we have to do is loop over each service, and try to change its configuration or move its files, then restart the service if successful. PoC for escalating privileges: http://scriptjunkie1.110mb.com/security/service_permissions_escalate.rb