- Автор темы
- Добавить закладку
- #21
cs doesnt worked on the networkYou can run it remotely from your attack machine if you have network access, you dont need to run it locally
Do you suggest anything for proxy on network??
cs doesnt worked on the networkYou can run it remotely from your attack machine if you have network access, you dont need to run it locally
If it has internet access, just get a reverse shell via meterpreter or if that is not possible, use ligolo to set up tunnel/ proxy and connect your machine to their network. Ligolo does not need admin privs to run, but it is detected by AV.cs doesnt worked on the network
Do you suggest anything for proxy on network??
waiting,hello everyone
We have some access, but we need LPE for admin access
1-Windows 2012 R2 64 bit
2-Microsoft(R) Windows(R) Server 2003 Enterprise x64 Edition
Operating system version: 5.2.3790 Service Pack 2 build 3790
this users in the domain
domain user
two access dont have any AV/EDR
Is there a way to get admin access?
Or anything that helps us
thanks
AutoElevate? how to use?
another way?
- The compromised user must belong to the "Administrators group".для этого юзер должен быть в группе administrators
wmic service get name,displayname,pathname,startmode | findstr /i "auto" | findstr /i /v "C:\Windows\\" | findstr /i /v """
try Admin2Sys
Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM
now , we run it Admin2Sys with cmd but not workingtry Admin2Sys
Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM
whoami /privdo whoami /priv
we check this , doesnt work (проверяй дырки на 2003 с eternalromance, если 3389 открыт блукип смотри
ну тогда х#й забей)))we check this , doesnt work (
yes , this user in DC , and we landed on DC , this user dont have admin access , we get dc server with domain user , ok? we just need shell as adminIt's kinda unclear what you want to do. If pc is joined to domain, and you are logged in as standard domain user, you cannot elevate with UAC bypass, since it requires administrator credentials for elevation.
If you are logged as normal user (LOCAL not DOMAIN) you can ascend easily. I assume you landed on DC since both of machines are windows Servers right ?
xDwell then forget it)))
how to dump hashes? without access ad administrator?If I were you, I would dump the hashes