-
Notifications
You must be signed in to change notification settings - Fork 104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Escalation of privileges #2
Comments
This Link (wiki) explains all the steps required to elevate current session ... The follow screenshot shows how the priv escal works ( manual test ) ... Final notes:WStore.vbs script its uploaded to target machine to execute the delay time required for attacker to be abble to EXIT and RESTART the meterpeter console prompt and recive the elevated connection back ..
|
Thanks, I managed to understand and it worked perfectly here, now my question is about the persistent mode, I activated the option, I left the program, restarted the windows machine and I was unable to return to the system access. |
what persistence did you have pick up ??
|
I used almost all the options but I did not get a reverse access from the remote system, my question is whether the persistent mode serves as a Backdoor allowing to return to the system how does this access work? does it happen reversely? do I have to put the tool back into listening mode on the same IP and port? |
yes... you have to put meterpeter in Remmenber to use the same port number|IP addr|obfuscation type of the persisted client Please Read this 'WIKI' that explains the all 'persistence' mechanism. |
Hello, I would like to know how it works to escalate privileges in the system.
I even went to the
postexploit
->escalate
->getsystem
options ..and it looks like the process was OK, but how to access the session with those elevated privileges,
from now on I don't know what else to do. Thanks in advance.
The text was updated successfully, but these errors were encountered: