Runas
Last updated
Last updated
With some sort of credentials we are able to run this command to execute commands as the user we would like to.
The TryHackMe Throwback network had an elevation of privileges through this.
When we invoked SEATBELT.exe we saw that there were some credentials that were stored in the machine for an administrator. With this we were able to elevate privileges by running the command line as him.
We ran the following command:
Now in the case that we find some sort of vulnerability like we found on DVR4, once we have access to other credentials and we spray them across all attack vectors and they don't work, we are going to try this technique.