Priv Escalation
AWK7335736
AWL7637858
AWK7368638
ARL4462545
AWL5424525
AWK3625245
*Evil-WinRM* PS C:\Departments\IT\dr> cat offsite_dr_invocation.txt
contact: mark allory
building pin: 12443231
new joiner
Bridget Nielson
bnielson
Fabricorp01
SeLoadDriverPrivilege
With this privielge we can basically run a vulnerable driver and exploit it.
Following this github's instructions I was able to load a driver and exploit it to launch a reverse shell as system.
Last updated