Post Exploit Checks
Post Exploit
AutoLogon Credentials
Enumerate open ports
Powershell
PSCredentials
The PSCredentital Object is used to perform authenticated action / actions as another user in the machine
Execute Command as another user ( RUN-AS)
Machine
Privilege Escalation
UAC
If a user belongs to the administrator groups and cannot execute the commands as Admin ( moving to Administrator's Desktop for eg.). Indicatest that there is a UAC is enabled
The bypass can also be checked with SharpUp.exe
The output of the sharpup.exe suggests the UAC can be bypassed
UAC Bypass
General Methods by ivanitlearning - Here
1. Mounting
With
net use n: \\127.0.0.1\C$
-> mounts the C directory as a new share as n
2. DLL Hijacking
Create a malicious dll file
2. Compile the generated malicious dll
3. GreatSCT takes care of the rest
3. Akagi
Compile the binary and use to bypass
4. FileLess UAC Bypass
Windows 7
Fileless UAC bypass, without using any applications to bypass the UAC
The registries are being used to perform the action
The detailed blog can be found here.
Commands
Shell will be obtained as NT Authority\System
Last updated
Was this helpful?