Windows Privilege Escalation - Using Stored Credentials

Windows Privilege Escalation - Using Stored Credentials

HackerSploit

2 года назад

11,792 Просмотров

In this video, I demonstrate the process of searching for utilizing stored Windows credentials in conjunction with the Windows Runas utility in order to execute a payload with elevated privileges.

//LINKS
THM Room: https://bit.ly/3s35E9n
winPEAS: https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS

//PLATFORMS
BLOG ►► https://bit.ly/3qjvSjK
FORUM ►► https://bit.ly/39r2kcY
ACADEMY ►► https://bit.ly/39CuORr

//SOCIAL NETWORKS
TWITTER ►► https://bit.ly/3sNKXfq
DISCORD ►► https://bit.ly/3hkIDsK
INSTAGRAM ►► https://bit.ly/3sP1Syh
LINKEDIN ►► https://bit.ly/360qwlN
PATREON ►► https://bit.ly/365iDLK
MERCHANDISE ►► https://bit.ly/3c2jDEn

//BOOKS
Privilege Escalation Techniques ►► https://amzn.to/3ylCl33
Docker Security Essentials (FREE) ►► https://bit.ly/3pDcFuA

//SUPPORT THE CHANNEL
NordVPN Affiliate Link (73% Off) ►► https://bit.ly/3DEPbu5
Get $100 In Free Linode Credit ►► https://bit.ly/3yagvix

//CYBERTALK PODCAST
Spotify ►► https://spoti.fi/3lP65jv
Apple Podcasts ►► https://apple.co/3GsIPQo

//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

-----------------------------------------------------------------------------------
#Pentesting#Cybersecurity

Тэги:

#hackersploit #hacker_exploit #hacking #kali_linux #weak_registry_permissions #privilege_escalation_registry #windows #privilege_escalation #penetration_testing #ethical_hacking #windows_privilege_escalation_oscp #windows_privilege_escalation_tryhackme #windows_privilege_escalation_powershell #pentesting #windows_privilege_escalation #windows_privilege_escalation_script #windows_privilege_escalation_tools #privesc #privilege_escalation_windows #privilege_escalation_attack
Ссылки и html тэги не поддерживаются


Комментарии:

Blender Up
Blender Up - 01.05.2023 15:19

So it is easy to use psexec, I want to see without

Ответить
Alrick Yt
Alrick Yt - 29.04.2022 04:54

How do you get the meterpreter unprivileged?

Ответить
RandomGuy
RandomGuy - 16.01.2022 22:02

Thank you for this series man!
Really appreciate it.

Ответить
localhost
localhost - 16.01.2022 19:01

Thanks

Ответить
Mahmudul Hasan
Mahmudul Hasan - 15.01.2022 21:45

first time seeing your face🙂

Ответить
filtered
filtered - 15.01.2022 10:46

Thankyou for introducing us into cmdkey n runas . Both finds useful . .but bit disappointed to see no high privileged user can't be obtained even we ran the .exe file from an admin user ? Why it so?

Ответить
Ben Jiles
Ben Jiles - 15.01.2022 07:10

Thank you for continuing to reiterate that students should most importantly learn how the tools work instead of just using them blindly. Keep up the good work

Ответить
OMER
OMER - 15.01.2022 06:43

thanks

Ответить
SyntaxicalEcho
SyntaxicalEcho - 15.01.2022 03:31

Am here and subbed.

Ответить
Abdulsamad muyideen
Abdulsamad muyideen - 15.01.2022 03:08

First time soo happy 😃😃

Ответить
Abdulsamad muyideen
Abdulsamad muyideen - 15.01.2022 03:08

Number one 😂😂😂

Ответить