All language subtitles for Windows Enumeration With winPEAS

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:04,560 --> 00:00:07,879 [Music] 2 00:00:07,879 --> 00:00:10,280 hey guys hack exploit here back again 3 00:00:10,280 --> 00:00:12,160 with another video Welcome Back to the 4 00:00:12,160 --> 00:00:15,200 penetration testing boot camp uh in this 5 00:00:15,200 --> 00:00:17,199 video or in this set of videos we will 6 00:00:17,199 --> 00:00:19,520 be uh taking a look at the various 7 00:00:19,520 --> 00:00:21,519 Windows privilege escalation uh 8 00:00:21,519 --> 00:00:23,199 techniques or vectors that you can use 9 00:00:23,199 --> 00:00:25,599 to elevate your privileges on a Windows 10 00:00:25,599 --> 00:00:28,160 system and again this is part of the pen 11 00:00:28,160 --> 00:00:29,720 testing boot camp so we've covered post 12 00:00:29,720 --> 00:00:31,480 EXP itation we're now moving on to 13 00:00:31,480 --> 00:00:33,879 pesque we'll also be covering we we'll 14 00:00:33,879 --> 00:00:36,440 also be covering prives on Linux so 15 00:00:36,440 --> 00:00:37,760 again I just want to make sure that 16 00:00:37,760 --> 00:00:39,719 we're uh we all have an understanding of 17 00:00:39,719 --> 00:00:41,960 where we are and where we're going now 18 00:00:41,960 --> 00:00:44,200 I've been getting a lot of messages 19 00:00:44,200 --> 00:00:46,960 regarding uh the log forj or the log for 20 00:00:46,960 --> 00:00:48,920 Shell vulnerability and how to exploit 21 00:00:48,920 --> 00:00:51,520 it and I'm currently working on an 22 00:00:51,520 --> 00:00:53,239 in-depth video that covers the 23 00:00:53,239 --> 00:00:56,079 exploitation not just of uh you know of 24 00:00:56,079 --> 00:00:58,359 the vulnerability on Minecraft servers 25 00:00:58,359 --> 00:01:00,680 uh but also on the very ious Apache 26 00:01:00,680 --> 00:01:03,160 Solutions out there so uh do stay tuned 27 00:01:03,160 --> 00:01:05,760 for that in this uh video we'll be 28 00:01:05,760 --> 00:01:08,400 focusing primarily on performing uh 29 00:01:08,400 --> 00:01:11,000 local enumeration with a uh a script or 30 00:01:11,000 --> 00:01:13,159 a tool called wipas which you guys have 31 00:01:13,159 --> 00:01:15,400 seen me use before uh the objective of 32 00:01:15,400 --> 00:01:17,799 this video is again to perform local 33 00:01:17,799 --> 00:01:19,840 enumeration on the system in order to 34 00:01:19,840 --> 00:01:22,240 identify uh the various vulnerabilities 35 00:01:22,240 --> 00:01:23,799 that we can essentially exploit to 36 00:01:23,799 --> 00:01:26,280 elevate our privileges and this uh the 37 00:01:26,280 --> 00:01:27,960 room that we'll be utilizing is the 38 00:01:27,960 --> 00:01:30,680 windows prives room on triac me it's a 39 00:01:30,680 --> 00:01:33,079 free room and it's an intermediate room 40 00:01:33,079 --> 00:01:35,280 so uh the objective here is to 41 00:01:35,280 --> 00:01:37,360 essentially Elevate our privileges to 42 00:01:37,360 --> 00:01:39,840 the highest level I've already started 43 00:01:39,840 --> 00:01:42,000 the actual machine here and let me just 44 00:01:42,000 --> 00:01:44,719 copy the IP there and as you can see 45 00:01:44,719 --> 00:01:46,079 there are various techniques that we'll 46 00:01:46,079 --> 00:01:47,920 be exploring and in my view this is 47 00:01:47,920 --> 00:01:49,759 pretty much one of the best rooms on 48 00:01:49,759 --> 00:01:52,040 traki uh that goes over the various 49 00:01:52,040 --> 00:01:54,320 privilege escalation vectors on windows 50 00:01:54,320 --> 00:01:57,079 so without further Ado uh the primary 51 00:01:57,079 --> 00:01:59,439 access Vector is VI RDP so again we're 52 00:01:59,439 --> 00:02:01,200 not exploiting anything on the target 53 00:02:01,200 --> 00:02:03,680 system although that could be an option 54 00:02:03,680 --> 00:02:06,320 uh but we'll just copy the xfree RDP 55 00:02:06,320 --> 00:02:08,440 command here to uh essentially start up 56 00:02:08,440 --> 00:02:11,319 an RDP session you're free to use Rina 57 00:02:11,319 --> 00:02:13,959 if you want as well so there we are 58 00:02:13,959 --> 00:02:16,840 that'll open up the RDP session for us 59 00:02:16,840 --> 00:02:18,440 and we'll give that a couple of seconds 60 00:02:18,440 --> 00:02:21,280 it looks like it's a uh Windows Server 61 00:02:21,280 --> 00:02:23,440 uh box so we'll just wait for that to 62 00:02:23,440 --> 00:02:26,040 load up um looks like it's starting up 63 00:02:26,040 --> 00:02:27,959 CMD for some reason there we are Windows 64 00:02:27,959 --> 00:02:31,959 Server 2019 evaluation now if we take a 65 00:02:31,959 --> 00:02:33,519 look at the instructions here you can 66 00:02:33,519 --> 00:02:34,760 see that we're logging in as an 67 00:02:34,760 --> 00:02:36,680 unprivileged user so I just want you to 68 00:02:36,680 --> 00:02:38,360 take note of that because that's very 69 00:02:38,360 --> 00:02:40,879 important so uh again as I said we're 70 00:02:40,879 --> 00:02:42,560 going to be using a tool called win 71 00:02:42,560 --> 00:02:44,680 piece to perform enumeration in the 72 00:02:44,680 --> 00:02:46,959 previous set of videos uh within the 73 00:02:46,959 --> 00:02:49,400 post exploitation series I covered how 74 00:02:49,400 --> 00:02:51,879 to perform manual enumeration on Windows 75 00:02:51,879 --> 00:02:53,599 and we were primarily focused on 76 00:02:53,599 --> 00:02:55,840 performing enumeration on an active 77 00:02:55,840 --> 00:02:57,640 directory environment but again the 78 00:02:57,640 --> 00:03:00,080 techniques are also uh in know to to 79 00:03:00,080 --> 00:03:02,239 some degree applicable on a standard 80 00:03:02,239 --> 00:03:05,440 Windows system so what is wipas well 81 00:03:05,440 --> 00:03:09,319 wipas is essentially a binary or a tool 82 00:03:09,319 --> 00:03:11,720 that can be used to uh essentially 83 00:03:11,720 --> 00:03:14,040 automate all the you know traditional 84 00:03:14,040 --> 00:03:15,799 information gathering uh checks that 85 00:03:15,799 --> 00:03:18,360 You' perform on a Windows system and 86 00:03:18,360 --> 00:03:20,239 more specifically it actually gives you 87 00:03:20,239 --> 00:03:21,920 important diagnostic information 88 00:03:21,920 --> 00:03:24,640 regarding vulnerable Services uh more to 89 00:03:24,640 --> 00:03:26,959 do with elevating your privileges but 90 00:03:26,959 --> 00:03:29,519 just basically uh it it really gives you 91 00:03:29,519 --> 00:03:32,680 a comprehensive rundown of uh the system 92 00:03:32,680 --> 00:03:35,120 configuration any misconfigurations or 93 00:03:35,120 --> 00:03:36,519 vulnerabilities that we can take 94 00:03:36,519 --> 00:03:38,760 advantage of so on and so forth all 95 00:03:38,760 --> 00:03:40,560 right now the GitHub repository will be 96 00:03:40,560 --> 00:03:43,040 in the description section and you can 97 00:03:43,040 --> 00:03:44,799 see that right over here we have the 98 00:03:44,799 --> 00:03:47,799 batch file as well as sorry the bat file 99 00:03:47,799 --> 00:03:50,040 as well as the exe binaries here so if I 100 00:03:50,040 --> 00:03:52,079 click on that uh you can see you have 101 00:03:52,079 --> 00:03:53,599 the source code so you can actually go 102 00:03:53,599 --> 00:03:55,239 through it and compile it yourself if 103 00:03:55,239 --> 00:03:57,319 you're not comfortable uh or if you're 104 00:03:57,319 --> 00:03:59,400 not you know if you don't feel safe uh 105 00:03:59,400 --> 00:04:01,159 you know just download downloading and 106 00:04:01,159 --> 00:04:03,560 executing a binary of the internet so 107 00:04:03,560 --> 00:04:06,360 I'll click on wipes here and uh you can 108 00:04:06,360 --> 00:04:08,159 see there we are that's the source code 109 00:04:08,159 --> 00:04:10,560 there so I'll just take a step back and 110 00:04:10,560 --> 00:04:12,720 if we take a look at the binaries uh we 111 00:04:12,720 --> 00:04:14,400 have the obvious skated releases which 112 00:04:14,400 --> 00:04:16,639 have been obvious skated so if you click 113 00:04:16,639 --> 00:04:19,079 on that you can see that you have the do 114 00:04:19,079 --> 00:04:21,239 obfuscated uh binaries and then you have 115 00:04:21,239 --> 00:04:24,240 your obfuscated uh binaries here so uh 116 00:04:24,240 --> 00:04:25,960 they're sorted based on the target 117 00:04:25,960 --> 00:04:27,560 operating system architecture so you 118 00:04:27,560 --> 00:04:30,360 have 32-bit 64-bit as well as any 119 00:04:30,360 --> 00:04:32,199 architecture which will run on uh pretty 120 00:04:32,199 --> 00:04:35,560 much both 32bit and 64-bit versions of 121 00:04:35,560 --> 00:04:37,720 Windows uh in this case it looks like 122 00:04:37,720 --> 00:04:39,680 it's Windows Server so it's a it's a 123 00:04:39,680 --> 00:04:42,039 64-bit system so we'll be utilizing the 124 00:04:42,039 --> 00:04:45,360 64-bit binary there we are and again you 125 00:04:45,360 --> 00:04:47,080 can just download it onto your Cali 126 00:04:47,080 --> 00:04:48,919 system and then in terms of transferring 127 00:04:48,919 --> 00:04:51,280 it you can transfer it onto the target 128 00:04:51,280 --> 00:04:53,680 system via CT util or through a 129 00:04:53,680 --> 00:04:57,120 interpreter session so um as for the uh 130 00:04:57,120 --> 00:04:59,080 tasks here that's already done so we'll 131 00:04:59,080 --> 00:05:00,320 hit complete 132 00:05:00,320 --> 00:05:02,039 and if we move to the first or the 133 00:05:02,039 --> 00:05:03,680 second task here which essentially 134 00:05:03,680 --> 00:05:05,479 involves generating a reverse shell 135 00:05:05,479 --> 00:05:08,120 executable as our primary access Vector 136 00:05:08,120 --> 00:05:10,360 so uh the technique highlighted here 137 00:05:10,360 --> 00:05:12,360 essentially involves setting up an SMB 138 00:05:12,360 --> 00:05:14,440 server and then transferring it over to 139 00:05:14,440 --> 00:05:19,280 the Target via our our RDP session I I I 140 00:05:19,280 --> 00:05:22,160 pretty much prefer utilizing a u you 141 00:05:22,160 --> 00:05:24,400 know utilizing the web delivery metas 142 00:05:24,400 --> 00:05:26,000 Spate module so that's what I'm going to 143 00:05:26,000 --> 00:05:27,840 be doing although you can also follow 144 00:05:27,840 --> 00:05:29,440 along with the techniques highlighted 145 00:05:29,440 --> 00:05:30,240 here 146 00:05:30,240 --> 00:05:32,600 all right so I'll start up my I'll open 147 00:05:32,600 --> 00:05:35,720 up a new tab here and I'll start up msf 148 00:05:35,720 --> 00:05:38,600 console and what we'll do is we will 149 00:05:38,600 --> 00:05:40,479 essentially generate a partial command 150 00:05:40,479 --> 00:05:42,160 that will then execute on the target 151 00:05:42,160 --> 00:05:43,759 system and that'll provide us with a 152 00:05:43,759 --> 00:05:45,960 interpreter session after which we can 153 00:05:45,960 --> 00:05:47,000 perform the 154 00:05:47,000 --> 00:05:49,479 enumeration uh with win peas all right 155 00:05:49,479 --> 00:05:52,800 so we'll give that a couple of seconds 156 00:05:52,800 --> 00:05:54,639 there all right there we are it looks 157 00:05:54,639 --> 00:05:56,880 like it's starting up msf usually takes 158 00:05:56,880 --> 00:05:59,199 a few seconds there we are I'll search 159 00:05:59,199 --> 00:06:01,039 for the module and of course I covered 160 00:06:01,039 --> 00:06:02,759 how to use it so you should be familiar 161 00:06:02,759 --> 00:06:06,319 with it now um I'll just hit copy and 162 00:06:06,319 --> 00:06:08,479 we'll hit paste and then we want to set 163 00:06:08,479 --> 00:06:11,880 the target as Powershell and we will use 164 00:06:11,880 --> 00:06:14,880 the binary option so uh there we are let 165 00:06:14,880 --> 00:06:17,319 me set that up correctly binary and then 166 00:06:17,319 --> 00:06:20,840 set the payload if we show the options 167 00:06:20,840 --> 00:06:23,440 now uh you can see we still need need to 168 00:06:23,440 --> 00:06:24,919 set up the payload so I'm going to say 169 00:06:24,919 --> 00:06:27,400 Set uh payload and then we can set up 170 00:06:27,400 --> 00:06:28,880 the Powershell payload so I'm going to 171 00:06:28,880 --> 00:06:30,120 say Powershell 172 00:06:30,120 --> 00:06:33,240 so that is not po shell but um we're 173 00:06:33,240 --> 00:06:35,639 going to set the payload to Windows and 174 00:06:35,639 --> 00:06:38,199 then we'll say po shell and we're using 175 00:06:38,199 --> 00:06:41,360 a non-staged module here so Powershell 176 00:06:41,360 --> 00:06:45,120 reverse TCP show the options 177 00:06:45,120 --> 00:06:47,440 again and we're going to set the lhost 178 00:06:47,440 --> 00:06:49,360 option so let me just check out my IP 179 00:06:49,360 --> 00:06:52,560 here so ip config and tunnel zero is the 180 00:06:52,560 --> 00:06:54,520 interface so I'll copy that there so 181 00:06:54,520 --> 00:06:57,800 I'll say set l l host and we'll we'll 182 00:06:57,800 --> 00:07:00,560 leave the L Port as Port 44 44 which is 183 00:07:00,560 --> 00:07:04,319 fine so show options and uh we then need 184 00:07:04,319 --> 00:07:06,560 to set up a few other options one of 185 00:07:06,560 --> 00:07:08,319 them is going to be an advanced option 186 00:07:08,319 --> 00:07:10,240 so show 187 00:07:10,240 --> 00:07:13,039 Advanced there we are and uh the option 188 00:07:13,039 --> 00:07:16,199 we want to disable is the Parell encode 189 00:07:16,199 --> 00:07:18,080 option so let me see if I can find that 190 00:07:18,080 --> 00:07:20,440 here so that's pow shell encoded command 191 00:07:20,440 --> 00:07:22,360 we're going to set that to false so I'm 192 00:07:22,360 --> 00:07:24,720 going to copy that uh sorry let me just 193 00:07:24,720 --> 00:07:26,800 get that done there and we're going to 194 00:07:26,800 --> 00:07:30,759 say set partial encoded command to false 195 00:07:30,759 --> 00:07:33,240 there we go and if we now hit exploit we 196 00:07:33,240 --> 00:07:35,120 should get the PowerAll code that we can 197 00:07:35,120 --> 00:07:37,240 then ex we we can then execute on the 198 00:07:37,240 --> 00:07:40,039 target system so uh I'll give that a 199 00:07:40,039 --> 00:07:41,560 couple of seconds there there we are 200 00:07:41,560 --> 00:07:43,639 it's generated it for us and it starts 201 00:07:43,639 --> 00:07:47,639 up the Handler so uh we'll copy that and 202 00:07:47,639 --> 00:07:49,759 we'll then head over here and we'll open 203 00:07:49,759 --> 00:07:53,000 up a command prompt so I'll give that a 204 00:07:53,000 --> 00:07:55,159 couple of seconds uh because you know 205 00:07:55,159 --> 00:07:57,879 this is a VM after all well not a VM 206 00:07:57,879 --> 00:07:59,520 it's a cloud instance and of course 207 00:07:59,520 --> 00:08:02,800 resources are going to be uh scarce so 208 00:08:02,800 --> 00:08:04,479 I'll just paste that in there and of 209 00:08:04,479 --> 00:08:05,919 course you can get rid of the Hidden 210 00:08:05,919 --> 00:08:07,759 option there so that it executes and 211 00:08:07,759 --> 00:08:09,319 doesn't close up the window if you want 212 00:08:09,319 --> 00:08:11,360 to actually know where there are any 213 00:08:11,360 --> 00:08:14,240 errors I'll just hit enter and that 214 00:08:14,240 --> 00:08:17,000 should open up a pow shell window here 215 00:08:17,000 --> 00:08:18,440 which means that it's executed 216 00:08:18,440 --> 00:08:20,720 successfully there we are and it should 217 00:08:20,720 --> 00:08:22,000 send the 218 00:08:22,000 --> 00:08:25,199 stage there we are delivering the 219 00:08:25,199 --> 00:08:28,120 payload and we'll give that a couple of 220 00:08:28,120 --> 00:08:30,879 seconds there we looks like that is done 221 00:08:30,879 --> 00:08:34,560 delivering payload is done um any errors 222 00:08:34,560 --> 00:08:36,719 there nothing there have we got a 223 00:08:36,719 --> 00:08:40,240 interpreter session probably there we 224 00:08:40,240 --> 00:08:42,080 are power shell session well sorry we 225 00:08:42,080 --> 00:08:43,680 actually need to upgrade the power shell 226 00:08:43,680 --> 00:08:46,839 session into a interpreter session so if 227 00:08:46,839 --> 00:08:48,959 we say sessions you can see we have the 228 00:08:48,959 --> 00:08:50,399 power shell session there so I'm going 229 00:08:50,399 --> 00:08:52,440 to upgrade the command shell or the 230 00:08:52,440 --> 00:08:55,080 power Shell Shell uh into a meterpreter 231 00:08:55,080 --> 00:08:56,959 shell and that's that can be done by 232 00:08:56,959 --> 00:08:59,600 using the sessions U option and the 233 00:08:59,600 --> 00:09:01,519 session we want to upgrade is session 234 00:09:01,519 --> 00:09:03,760 one there we are don't worry if it gives 235 00:09:03,760 --> 00:09:05,519 you the error that this may not be 236 00:09:05,519 --> 00:09:07,040 compatible with this module that's 237 00:09:07,040 --> 00:09:09,560 simply just um a message to to to to 238 00:09:09,560 --> 00:09:11,480 actually inform you to keep you aware of 239 00:09:11,480 --> 00:09:14,279 that so uh there we are sending the 240 00:09:14,279 --> 00:09:17,040 stage and we should get a MPR session on 241 00:09:17,040 --> 00:09:19,399 the target system there we are 242 00:09:19,399 --> 00:09:22,560 meterpreter session two 243 00:09:24,640 --> 00:09:27,480 opened sessions there we are and we get 244 00:09:27,480 --> 00:09:30,519 a 64-bit session so session too let's 245 00:09:30,519 --> 00:09:32,760 perform some basic enumeration so CIS 246 00:09:32,760 --> 00:09:35,480 info uh you know get us ID and then of 247 00:09:35,480 --> 00:09:37,360 course you can pop a native command 248 00:09:37,360 --> 00:09:39,959 shell and then uh essentially you know 249 00:09:39,959 --> 00:09:41,839 perform all of the commands that we had 250 00:09:41,839 --> 00:09:44,399 taken a look at previously in this case 251 00:09:44,399 --> 00:09:46,279 however we're just going to navigate to 252 00:09:46,279 --> 00:09:49,160 the root of the C drive and uh into the 253 00:09:49,160 --> 00:09:51,040 temp directory which is where I want to 254 00:09:51,040 --> 00:09:53,399 save the wipie binary and then I can 255 00:09:53,399 --> 00:09:56,200 upload it so I can say upload and in my 256 00:09:56,200 --> 00:09:58,519 case I've saved the win piece binary on 257 00:09:58,519 --> 00:10:02,200 my desktop under Windows enum and then I 258 00:10:02,200 --> 00:10:05,120 of course I have um winp there we have 259 00:10:05,120 --> 00:10:07,040 there's the folder and then I'm going to 260 00:10:07,040 --> 00:10:10,000 upload uh winp 261 00:10:10,000 --> 00:10:13,880 x64.exe upload that there and they will 262 00:10:13,880 --> 00:10:15,240 give that a couple of seconds to 263 00:10:15,240 --> 00:10:17,640 actually 264 00:10:20,680 --> 00:10:23,079 complete there we are looks like it's 265 00:10:23,079 --> 00:10:24,760 completed and then of course we can pop 266 00:10:24,760 --> 00:10:27,320 a shell here and we're currently within 267 00:10:27,320 --> 00:10:29,399 the temp directory which is great and we 268 00:10:29,399 --> 00:10:32,000 can then execute the wipas executable so 269 00:10:32,000 --> 00:10:36,120 winp x64.exe however before you do that 270 00:10:36,120 --> 00:10:38,800 you can open up the help uh menu right 271 00:10:38,800 --> 00:10:41,160 over here now this is very important 272 00:10:41,160 --> 00:10:43,959 because if you run win pece by default 273 00:10:43,959 --> 00:10:46,000 or just without any arguments or any 274 00:10:46,000 --> 00:10:48,399 other options it's going to go through 275 00:10:48,399 --> 00:10:50,519 all of the uh enumeration right so it's 276 00:10:50,519 --> 00:10:51,839 going to enumerate all of this 277 00:10:51,839 --> 00:10:53,200 information right over here so it's 278 00:10:53,200 --> 00:10:54,920 going to enumerate the domain 279 00:10:54,920 --> 00:10:56,800 information if it's part of a domain 280 00:10:56,800 --> 00:10:58,800 system information User information 281 00:10:58,800 --> 00:11:02,079 process service etc etc so uh if you're 282 00:11:02,079 --> 00:11:04,120 uh specifically looking for a specific 283 00:11:04,120 --> 00:11:05,760 set of information like the user 284 00:11:05,760 --> 00:11:07,920 information I can specify that so I can 285 00:11:07,920 --> 00:11:10,440 say winp uh 286 00:11:10,440 --> 00:11:12,959 x64.exe and then I can 287 00:11:12,959 --> 00:11:17,000 say user information so user info hit 288 00:11:17,000 --> 00:11:19,360 enter that'll only enumerate the user 289 00:11:19,360 --> 00:11:20,959 information here so we'll give that a 290 00:11:20,959 --> 00:11:23,120 couple of seconds there we are let's 291 00:11:23,120 --> 00:11:24,680 take a look at what information this 292 00:11:24,680 --> 00:11:26,160 will give us because this is quite 293 00:11:26,160 --> 00:11:28,560 important so first and foremost you can 294 00:11:28,560 --> 00:11:30,279 see that it'll go through the following 295 00:11:30,279 --> 00:11:31,839 checklist so it'll check if it's part of 296 00:11:31,839 --> 00:11:34,560 a domain getting the user account info 297 00:11:34,560 --> 00:11:37,279 the group list active user list disabled 298 00:11:37,279 --> 00:11:40,120 users admin users and uh files or 299 00:11:40,120 --> 00:11:41,920 directories uh that we can essentially 300 00:11:41,920 --> 00:11:44,240 search so uh check if you have some 301 00:11:44,240 --> 00:11:46,959 admin equivalent equivalent privileges 302 00:11:46,959 --> 00:11:49,360 uh you can see that the current user is 303 00:11:49,360 --> 00:11:51,560 not part of the admin group so we don't 304 00:11:51,560 --> 00:11:54,079 have any elevated privileges uh we have 305 00:11:54,079 --> 00:11:55,760 an admin user that's part of the 306 00:11:55,760 --> 00:11:57,720 administrator group as well as the 307 00:11:57,720 --> 00:11:59,839 administrator account and then of course 308 00:11:59,839 --> 00:12:01,560 we have our current user account the 309 00:12:01,560 --> 00:12:03,839 rest are you guest accounts and the 310 00:12:03,839 --> 00:12:06,440 default account which is disabled uh on 311 00:12:06,440 --> 00:12:09,639 you know modern versions of Windows um 312 00:12:09,639 --> 00:12:12,240 as for the other piece of information 313 00:12:12,240 --> 00:12:13,480 you can see you have your token 314 00:12:13,480 --> 00:12:15,720 privileges here and then of course 315 00:12:15,720 --> 00:12:17,760 logged on users it'll only tell us that 316 00:12:17,760 --> 00:12:20,079 we are currently logged on which is very 317 00:12:20,079 --> 00:12:22,279 important then uh display information 318 00:12:22,279 --> 00:12:24,360 about the uh local users which we've 319 00:12:24,360 --> 00:12:26,399 already gone over but you can get the 320 00:12:26,399 --> 00:12:28,720 user ID to identify whether that user is 321 00:12:28,720 --> 00:12:32,199 administ you know etc etc right um okay 322 00:12:32,199 --> 00:12:35,000 so the users that have logged on to the 323 00:12:35,000 --> 00:12:38,000 system administrator admin user okay so 324 00:12:38,000 --> 00:12:40,519 on and so forth you get the idea now we 325 00:12:40,519 --> 00:12:42,519 can enumerate all the information as I 326 00:12:42,519 --> 00:12:45,839 said previously by simply saying wipas 327 00:12:45,839 --> 00:12:46,480 uh 328 00:12:46,480 --> 00:12:50,480 x64.exe right so I'll hit enter and uh 329 00:12:50,480 --> 00:12:52,560 in this particular context the reason 330 00:12:52,560 --> 00:12:55,399 why I'm using wipas is because wipas 331 00:12:55,399 --> 00:12:57,519 will actually help you identify all of 332 00:12:57,519 --> 00:12:59,720 these privilege escalation vectors 333 00:12:59,720 --> 00:13:01,440 uh and whether or not the system is 334 00:13:01,440 --> 00:13:03,720 vulnerable to any of them right so it'll 335 00:13:03,720 --> 00:13:05,199 tell you whether you have any insecure 336 00:13:05,199 --> 00:13:07,160 service permissions unquoted Service 337 00:13:07,160 --> 00:13:09,199 Parts weak registry permissions uh 338 00:13:09,199 --> 00:13:12,040 insecure Service executables uh Auto 339 00:13:12,040 --> 00:13:14,199 runs uh they always install elevated 340 00:13:14,199 --> 00:13:16,680 vulnerability uh week registry uh 341 00:13:16,680 --> 00:13:19,720 permissions um so on and so forth right 342 00:13:19,720 --> 00:13:21,839 so let's go back here you can see it's 343 00:13:21,839 --> 00:13:23,440 still going through the check and I'm 344 00:13:23,440 --> 00:13:24,839 just going to wait for it to complete 345 00:13:24,839 --> 00:13:26,320 and then I'll take you through it step 346 00:13:26,320 --> 00:13:29,360 by step and that'll pretty much conclude 347 00:13:29,360 --> 00:13:31,000 this video because we'll then move on to 348 00:13:31,000 --> 00:13:33,800 the first privilege escalation Vector so 349 00:13:33,800 --> 00:13:35,320 if we take a look at the results from 350 00:13:35,320 --> 00:13:37,160 the beginning uh most of it is going to 351 00:13:37,160 --> 00:13:39,440 be diagnostic information pertinent to 352 00:13:39,440 --> 00:13:41,680 processes uh that are currently running 353 00:13:41,680 --> 00:13:43,839 the networking uh information like the 354 00:13:43,839 --> 00:13:45,720 interfaces which can be useful if you're 355 00:13:45,720 --> 00:13:48,320 trying to Pivot uh it'll also enumerate 356 00:13:48,320 --> 00:13:50,079 other information that can be quite 357 00:13:50,079 --> 00:13:52,399 useful but again we'll get to that in a 358 00:13:52,399 --> 00:13:54,320 few seconds right so there's quite a lot 359 00:13:54,320 --> 00:13:56,160 of in information here and you can see 360 00:13:56,160 --> 00:13:58,480 we have path injection vulnerabilities 361 00:13:58,480 --> 00:14:00,560 that have been detected um but let's 362 00:14:00,560 --> 00:14:03,279 take a look at the beginning here all 363 00:14:03,279 --> 00:14:05,440 right so there we are that's where it 364 00:14:05,440 --> 00:14:08,040 began so first and foremost you'll get 365 00:14:08,040 --> 00:14:10,639 the system information so the host name 366 00:14:10,639 --> 00:14:12,800 uh the version of Windows the release ID 367 00:14:12,800 --> 00:14:14,800 or the build version of Windows the 368 00:14:14,800 --> 00:14:17,120 architecture the the actual current 369 00:14:17,120 --> 00:14:19,680 version the time zone which can be quite 370 00:14:19,680 --> 00:14:22,079 important as well as the keyboard 371 00:14:22,079 --> 00:14:24,040 language and then whether or not it's a 372 00:14:24,040 --> 00:14:25,600 part of the domain the hot fix is 373 00:14:25,600 --> 00:14:28,160 installed Etc now as for the 374 00:14:28,160 --> 00:14:30,079 vulnerabilities that it identifies with 375 00:14:30,079 --> 00:14:31,800 whats and here these are going to be 376 00:14:31,800 --> 00:14:33,680 vulnerabilities uh pertinent to the 377 00:14:33,680 --> 00:14:36,079 kernel or you know parts of the Windows 378 00:14:36,079 --> 00:14:38,160 operating system that can be exploited 379 00:14:38,160 --> 00:14:40,000 to elevate Privileges and of course 380 00:14:40,000 --> 00:14:42,000 we'll be exploring kernel exploits in 381 00:14:42,000 --> 00:14:44,120 the next video as we progress uh but 382 00:14:44,120 --> 00:14:45,720 this is where you typically find that 383 00:14:45,720 --> 00:14:48,360 information so you get the exploit DB uh 384 00:14:48,360 --> 00:14:50,600 code or reference link if there is a 385 00:14:50,600 --> 00:14:52,680 publicly available exploit and then you 386 00:14:52,680 --> 00:14:54,240 get the reference link which could 387 00:14:54,240 --> 00:14:56,519 contain the exploit code or a proof of 388 00:14:56,519 --> 00:14:59,320 concept all right so uh for the install 389 00:14:59,320 --> 00:15:01,199 updates it'll give you the hot fix ID 390 00:15:01,199 --> 00:15:03,279 when it was installed uh and then of 391 00:15:03,279 --> 00:15:04,800 course the description and the title 392 00:15:04,800 --> 00:15:06,880 which is very important right so uh in 393 00:15:06,880 --> 00:15:08,959 this case you can see that the Microsoft 394 00:15:08,959 --> 00:15:11,399 updates are pertinent to uh one of them 395 00:15:11,399 --> 00:15:13,680 is pertinent to Windows uh antivirus or 396 00:15:13,680 --> 00:15:15,519 Windows Defender and then of course 397 00:15:15,519 --> 00:15:17,759 there's a driver install which is VMware 398 00:15:17,759 --> 00:15:19,519 which tells us that this is indeed a 399 00:15:19,519 --> 00:15:21,720 virtual machine okay the user 400 00:15:21,720 --> 00:15:23,480 environment variables we can which can 401 00:15:23,480 --> 00:15:26,199 be quite uh useful uh and then of course 402 00:15:26,199 --> 00:15:28,000 the system environment variable so you 403 00:15:28,000 --> 00:15:29,440 can see that the temp directory 404 00:15:29,440 --> 00:15:32,160 specified there uh the actual path and 405 00:15:32,160 --> 00:15:35,199 Driver data directories are specified uh 406 00:15:35,199 --> 00:15:38,160 so on and so forth all right let's take 407 00:15:38,160 --> 00:15:40,199 a look at some of the other options here 408 00:15:40,199 --> 00:15:42,240 LSA protection right so this is very 409 00:15:42,240 --> 00:15:44,440 important so if enabled a driver is 410 00:15:44,440 --> 00:15:47,040 needed to read Elsas memory uh so again 411 00:15:47,040 --> 00:15:49,600 it tells us right over here that L LSA 412 00:15:49,600 --> 00:15:52,120 protection is not enabled we'll get to 413 00:15:52,120 --> 00:15:54,319 uh why that is important and then of 414 00:15:54,319 --> 00:15:56,880 course credential guard is not enabled 415 00:15:56,880 --> 00:15:59,160 um we don't have uh it looks like we 416 00:15:59,160 --> 00:16:01,839 have cached creds uh which tells us 417 00:16:01,839 --> 00:16:04,000 right via cached log on count is set to 418 00:16:04,000 --> 00:16:06,600 10 right so uh credentials will be 419 00:16:06,600 --> 00:16:08,800 cashed in the registry and accessible by 420 00:16:08,800 --> 00:16:10,720 the system user so we'll only be able to 421 00:16:10,720 --> 00:16:13,360 access credentials um you know once 422 00:16:13,360 --> 00:16:15,440 we've elevated our privileges no 423 00:16:15,440 --> 00:16:17,880 antivirus was detected so it tells us 424 00:16:17,880 --> 00:16:19,639 that Windows Defender has been disabled 425 00:16:19,639 --> 00:16:21,720 in this case it makes sense because we 426 00:16:21,720 --> 00:16:23,959 were able to execute the poell code 427 00:16:23,959 --> 00:16:26,440 natively without encoding it right uh 428 00:16:26,440 --> 00:16:29,160 user access control status or UA C 429 00:16:29,160 --> 00:16:31,079 status it tells us that any local 430 00:16:31,079 --> 00:16:33,279 account can be used for lateral movement 431 00:16:33,279 --> 00:16:35,000 so we can pretty much Elevate our 432 00:16:35,000 --> 00:16:36,759 privileges directly if we were to try 433 00:16:36,759 --> 00:16:39,440 that right now uh via UAC and I'll cover 434 00:16:39,440 --> 00:16:42,160 that as well um but that's very very 435 00:16:42,160 --> 00:16:43,880 important right because that's one of 436 00:16:43,880 --> 00:16:45,519 the most common Windows privilege 437 00:16:45,519 --> 00:16:47,680 escalation vectors that you typically 438 00:16:47,680 --> 00:16:50,680 utilize is trying to bypass UAC and of 439 00:16:50,680 --> 00:16:52,639 course there's various techniques or 440 00:16:52,639 --> 00:16:54,279 Metasploit modules that can be used to 441 00:16:54,279 --> 00:16:57,839 do that um let's take a look at some of 442 00:16:57,839 --> 00:16:59,880 the other options here that I can 443 00:16:59,880 --> 00:17:01,759 actually go through so let's take a look 444 00:17:01,759 --> 00:17:04,160 at an example check here if we are 445 00:17:04,160 --> 00:17:07,199 trying to look for maybe um let's see uh 446 00:17:07,199 --> 00:17:09,160 insecure service permissions let's see 447 00:17:09,160 --> 00:17:11,079 if we can find information pertinent to 448 00:17:11,079 --> 00:17:14,360 that so again this is just the system uh 449 00:17:14,360 --> 00:17:18,000 configuration there um user information 450 00:17:18,000 --> 00:17:20,400 which we enumerated uh there we are and 451 00:17:20,400 --> 00:17:22,199 then of course the home folders there 452 00:17:22,199 --> 00:17:23,439 RDP 453 00:17:23,439 --> 00:17:26,120 sessions uh the password policy will 454 00:17:26,120 --> 00:17:27,799 tell you the minimum password the 455 00:17:27,799 --> 00:17:30,360 minimum and maximum password Edge the 456 00:17:30,360 --> 00:17:32,600 minimum and maximum password length or 457 00:17:32,600 --> 00:17:34,640 rather the minimum password length which 458 00:17:34,640 --> 00:17:37,600 again can be used to get an idea of uh 459 00:17:37,600 --> 00:17:39,520 you know of the length of the password 460 00:17:39,520 --> 00:17:42,039 if you're performing password cracking 461 00:17:42,039 --> 00:17:45,160 uh the print log on Services interesting 462 00:17:45,160 --> 00:17:47,440 processes right uh so right over here 463 00:17:47,440 --> 00:17:50,200 you can see that it identifies wipas as 464 00:17:50,200 --> 00:17:52,039 an interesting process that we can 465 00:17:52,039 --> 00:17:55,039 essentially perform D hijacking although 466 00:17:55,039 --> 00:17:57,559 in this case that's really not relevant 467 00:17:57,559 --> 00:17:59,280 um let's see if we can find there we are 468 00:17:59,280 --> 00:18:02,039 so Services information uh we're looking 469 00:18:02,039 --> 00:18:04,480 for insecure service permissions there 470 00:18:04,480 --> 00:18:07,400 we are so this is where you'll identify 471 00:18:07,400 --> 00:18:09,960 the weak uh service permission so for 472 00:18:09,960 --> 00:18:12,520 example the file uh the file permission 473 00:18:12,520 --> 00:18:14,240 service which is a vulnerable service 474 00:18:14,240 --> 00:18:16,200 that has been set up to demonstrate this 475 00:18:16,200 --> 00:18:18,280 vulnerability you can see that this 476 00:18:18,280 --> 00:18:19,799 particular service it gives you the 477 00:18:19,799 --> 00:18:23,159 actual path to the exe or the service 478 00:18:23,159 --> 00:18:25,720 the current status is stopped and we can 479 00:18:25,720 --> 00:18:27,559 start or stop it because the file 480 00:18:27,559 --> 00:18:29,640 permissions are set to everyone so any 481 00:18:29,640 --> 00:18:31,799 user on the system can access that 482 00:18:31,799 --> 00:18:34,320 service or interact uh with the service 483 00:18:34,320 --> 00:18:36,080 and we'll ex we'll actually explore that 484 00:18:36,080 --> 00:18:38,919 for unquoted service paths or the Y 485 00:18:38,919 --> 00:18:40,280 there we are that's the vulnerability 486 00:18:40,280 --> 00:18:42,440 there you can see we have the AWS light 487 00:18:42,440 --> 00:18:44,880 agent there so no quotes or spaces 488 00:18:44,880 --> 00:18:47,880 detected there and we can possibly uh 489 00:18:47,880 --> 00:18:49,480 exploit that and of course we have the 490 00:18:49,480 --> 00:18:52,440 actual unquoted Service uh uh the actual 491 00:18:52,440 --> 00:18:54,799 unquoted service here that uh we will be 492 00:18:54,799 --> 00:18:57,480 exploiting so no quotes or spaces 493 00:18:57,480 --> 00:18:59,679 detected all right 494 00:18:59,679 --> 00:19:02,360 so um of course this is um this will 495 00:19:02,360 --> 00:19:04,520 tell you whether you can modify uh any 496 00:19:04,520 --> 00:19:06,240 service or registry and in this case you 497 00:19:06,240 --> 00:19:08,159 can see that we can essentially modify 498 00:19:08,159 --> 00:19:10,559 the registry Service uh which again has 499 00:19:10,559 --> 00:19:13,000 been set up to demonstrate this dll 500 00:19:13,000 --> 00:19:15,240 hijacking that's uh the win piece 501 00:19:15,240 --> 00:19:17,400 directory so that's really not relevant 502 00:19:17,400 --> 00:19:20,559 there unquoted service path so there we 503 00:19:20,559 --> 00:19:23,720 are it identifies that uh as well there 504 00:19:23,720 --> 00:19:25,400 and then of course we have an auto run 505 00:19:25,400 --> 00:19:27,919 program there uh so on and so forth so 506 00:19:27,919 --> 00:19:29,440 you can see already already with win 507 00:19:29,440 --> 00:19:31,080 peas we've been able to identify the 508 00:19:31,080 --> 00:19:33,520 actual services that we can exploit uh 509 00:19:33,520 --> 00:19:35,480 in the case of uh you know the unquoted 510 00:19:35,480 --> 00:19:37,960 service path as well as insecure service 511 00:19:37,960 --> 00:19:40,039 permissions as well as the weak registry 512 00:19:40,039 --> 00:19:41,919 permissions and then of course you can 513 00:19:41,919 --> 00:19:44,440 go through it and uh you know enumerate 514 00:19:44,440 --> 00:19:47,000 as much information as possible uh 515 00:19:47,000 --> 00:19:48,480 regarding the type of privilege 516 00:19:48,480 --> 00:19:51,559 escalation uh Vector you you want to use 517 00:19:51,559 --> 00:19:54,039 right so this this is all path injection 518 00:19:54,039 --> 00:19:56,559 so on and so forth let's uh scroll right 519 00:19:56,559 --> 00:19:59,200 over here so it looks like we have 520 00:19:59,200 --> 00:20:01,720 unquoted um and space detected there 521 00:20:01,720 --> 00:20:03,720 that doesn't look like it's 522 00:20:03,720 --> 00:20:07,200 vulnerable and uh let's just scroll here 523 00:20:07,200 --> 00:20:08,760 there we are we have the scheduled 524 00:20:08,760 --> 00:20:11,480 applications here so this is uh this 525 00:20:11,480 --> 00:20:13,240 will essentially check if you can modify 526 00:20:13,240 --> 00:20:16,080 other users scheduled binaries so uh 527 00:20:16,080 --> 00:20:20,039 there we are it looks like this is uh s 528 00:20:20,039 --> 00:20:23,080 save credentials dobat and uh we can 529 00:20:23,080 --> 00:20:25,159 perform some DL hijacking there although 530 00:20:25,159 --> 00:20:28,280 that's not really important to us uh the 531 00:20:28,280 --> 00:20:30,840 other information here uh that I was 532 00:20:30,840 --> 00:20:32,400 trying to highlight because that's quite 533 00:20:32,400 --> 00:20:35,080 important there we are right so uh right 534 00:20:35,080 --> 00:20:37,080 over here this will look for cus tickets 535 00:20:37,080 --> 00:20:40,120 if you are on a an active directory 536 00:20:40,120 --> 00:20:42,960 environment and uh it'll then tell you 537 00:20:42,960 --> 00:20:44,840 the actual Security package credential 538 00:20:44,840 --> 00:20:46,200 so it's you can see it's telling us that 539 00:20:46,200 --> 00:20:49,720 we're using net ntlm version two so keep 540 00:20:49,720 --> 00:20:51,280 that in mind if you're trying to perform 541 00:20:51,280 --> 00:20:53,600 password cracking now it's already given 542 00:20:53,600 --> 00:20:56,159 us our hash here so we can use these 543 00:20:56,159 --> 00:20:58,360 hashes in different ways and we'll also 544 00:20:58,360 --> 00:21:00,200 be exploring how to perform the past the 545 00:21:00,200 --> 00:21:02,120 hash attack which I've explored 546 00:21:02,120 --> 00:21:04,039 previously uh so you really don't need 547 00:21:04,039 --> 00:21:05,880 to crack credentials unless it's 548 00:21:05,880 --> 00:21:08,840 necessary uh but we get uh you know 549 00:21:08,840 --> 00:21:10,640 passwords or credentials from other 550 00:21:10,640 --> 00:21:12,400 services or applications and in this 551 00:21:12,400 --> 00:21:14,799 case you can see that we get a puty 552 00:21:14,799 --> 00:21:17,480 session and we get the proxy username 553 00:21:17,480 --> 00:21:19,520 and proxy password so we've been able to 554 00:21:19,520 --> 00:21:21,400 gather information there Cloud 555 00:21:21,400 --> 00:21:23,400 credentials nothing there unattended 556 00:21:23,400 --> 00:21:25,960 files we have the unattended XML file 557 00:21:25,960 --> 00:21:28,559 which can possibly contain uh the 558 00:21:28,559 --> 00:21:31,520 Windows administrator credentials if uh 559 00:21:31,520 --> 00:21:33,799 the file has not been uh redacted but in 560 00:21:33,799 --> 00:21:36,279 this case we get the administrator uh it 561 00:21:36,279 --> 00:21:38,159 looks like the password there and this 562 00:21:38,159 --> 00:21:40,159 is of course for the you uh for the 563 00:21:40,159 --> 00:21:42,720 admin user so we can possibly try and 564 00:21:42,720 --> 00:21:44,440 authenticate because we've already got 565 00:21:44,440 --> 00:21:47,120 the credentials uh so let's actually try 566 00:21:47,120 --> 00:21:49,480 that now uh do I need to log out or can 567 00:21:49,480 --> 00:21:52,440 I just switch my current session there 568 00:21:52,440 --> 00:21:55,679 um yeah so I'm just going to sign out of 569 00:21:55,679 --> 00:21:58,840 that um and we'll give that a couple of 570 00:21:58,840 --> 00:22:01,240 seconds there and uh let me see if I can 571 00:22:01,240 --> 00:22:03,520 copy that I'm pretty sure that has been 572 00:22:03,520 --> 00:22:06,200 in base 64 encoded but you can pretty 573 00:22:06,200 --> 00:22:08,760 much log in uh let's see if we can log 574 00:22:08,760 --> 00:22:11,279 in like so 575 00:22:11,279 --> 00:22:14,159 um yeah let's just sign out anyway we'll 576 00:22:14,159 --> 00:22:16,679 I think we might lose 577 00:22:16,679 --> 00:22:19,279 our we might lose our interpreter 578 00:22:19,279 --> 00:22:21,679 session but that's fine uh we can try 579 00:22:21,679 --> 00:22:23,960 the admin or administrator I think 580 00:22:23,960 --> 00:22:26,440 that's the correct user 581 00:22:26,440 --> 00:22:28,679 administrator and we can paste it in 582 00:22:28,679 --> 00:22:30,039 there if this doesn't work then we can 583 00:22:30,039 --> 00:22:32,200 try and base you can try and decode it 584 00:22:32,200 --> 00:22:33,520 so I'll hit 585 00:22:33,520 --> 00:22:36,960 enter um looks like y it looks like 586 00:22:36,960 --> 00:22:39,720 there's an issue with the 587 00:22:39,720 --> 00:22:42,720 authentication um so what we can do is 588 00:22:42,720 --> 00:22:44,880 let's try and base let's try and decode 589 00:22:44,880 --> 00:22:46,600 it so I'm just going to create a file 590 00:22:46,600 --> 00:22:49,120 here called hash and I'll paste in the 591 00:22:49,120 --> 00:22:51,200 hash there and we can then decode it 592 00:22:51,200 --> 00:22:54,880 using the base 64 utility so basic4 593 00:22:54,880 --> 00:22:57,480 decode hash and it looks like the 594 00:22:57,480 --> 00:22:59,880 password is pass password one 12 three 595 00:22:59,880 --> 00:23:02,440 right so uh let's just take a note of 596 00:23:02,440 --> 00:23:07,000 that um there we are and uh we you can 597 00:23:07,000 --> 00:23:09,600 also utilize other tools if you want um 598 00:23:09,600 --> 00:23:11,600 so I'm just going to log in Via RDP 599 00:23:11,600 --> 00:23:14,720 again uh let me just go back in here and 600 00:23:14,720 --> 00:23:17,919 let me just copy the command there and 601 00:23:17,919 --> 00:23:19,679 uh we can then log in as administrator 602 00:23:19,679 --> 00:23:21,120 and let's see whether that actually 603 00:23:21,120 --> 00:23:23,919 works because we pretty much uh have you 604 00:23:23,919 --> 00:23:27,400 know evaded any of this here so 1 2 3 605 00:23:27,400 --> 00:23:29,840 and we'll change that to administrator 606 00:23:29,840 --> 00:23:31,960 but of course we're not going to rely on 607 00:23:31,960 --> 00:23:34,520 this because the unattended file uh I'll 608 00:23:34,520 --> 00:23:35,960 I'll get to that in a second and what 609 00:23:35,960 --> 00:23:37,720 it's used 610 00:23:37,720 --> 00:23:40,720 for um it looks like we have an issue 611 00:23:40,720 --> 00:23:45,039 there um let me just try and add 612 00:23:45,039 --> 00:23:49,200 uh sorry trying it enter was that part 613 00:23:49,200 --> 00:23:51,520 of the password uh yeah so I think what 614 00:23:51,520 --> 00:23:54,240 I'll do we can also try the admin user 615 00:23:54,240 --> 00:23:56,720 uh because it's not specified what user 616 00:23:56,720 --> 00:23:59,240 within the unattended files 617 00:23:59,240 --> 00:24:01,600 uh is uh you know the user account for 618 00:24:01,600 --> 00:24:03,159 this particular password but we can 619 00:24:03,159 --> 00:24:04,760 check it it looks like it's the admin 620 00:24:04,760 --> 00:24:07,080 user so there we are we're able to log 621 00:24:07,080 --> 00:24:09,559 on as the admin user and we should have 622 00:24:09,559 --> 00:24:12,200 elevated our privileges right so again 623 00:24:12,200 --> 00:24:14,440 as I said wipas is an extremely powerful 624 00:24:14,440 --> 00:24:15,960 tool and that's really what I'm trying 625 00:24:15,960 --> 00:24:18,279 to demonstrate here uh this is one of 626 00:24:18,279 --> 00:24:20,320 the vectors that you can utilize and we 627 00:24:20,320 --> 00:24:21,960 pretty much explored it I believe it's 628 00:24:21,960 --> 00:24:24,520 covered uh somewhere here it may have 629 00:24:24,520 --> 00:24:26,120 been covered although I'm not really 630 00:24:26,120 --> 00:24:28,159 sure but there we are you can utilize 631 00:24:28,159 --> 00:24:29,320 that and that's something that I've 632 00:24:29,320 --> 00:24:31,279 covered in my book so you can actually 633 00:24:31,279 --> 00:24:33,640 learn more about that right so uh the 634 00:24:33,640 --> 00:24:35,360 unattended file if you're not familiar 635 00:24:35,360 --> 00:24:37,679 with it is a configuration file that's 636 00:24:37,679 --> 00:24:39,919 created to uh you know it's essentially 637 00:24:39,919 --> 00:24:42,279 created when you're Mass installing uh 638 00:24:42,279 --> 00:24:44,559 Windows systems uh you know uh on a 639 00:24:44,559 --> 00:24:46,840 network so let's say you've been tasked 640 00:24:46,840 --> 00:24:48,559 uh to actually install uh you know 641 00:24:48,559 --> 00:24:51,760 windows on more than five systems uh you 642 00:24:51,760 --> 00:24:53,600 can automate the account creation 643 00:24:53,600 --> 00:24:55,640 process through the unattended uh 644 00:24:55,640 --> 00:24:57,559 configuration file where you can specify 645 00:24:57,559 --> 00:24:59,960 the administrative credentials and any 646 00:24:59,960 --> 00:25:02,240 other you know operating system specific 647 00:25:02,240 --> 00:25:04,640 configurations that you want set up 648 00:25:04,640 --> 00:25:07,399 during the installation process so again 649 00:25:07,399 --> 00:25:08,840 sometimes it's not cleaned up by 650 00:25:08,840 --> 00:25:11,360 administrators so if it's not cleaned up 651 00:25:11,360 --> 00:25:13,200 you can get the admin credentials from 652 00:25:13,200 --> 00:25:14,640 there and you don't have to go through 653 00:25:14,640 --> 00:25:16,840 the process of elevating your privileges 654 00:25:16,840 --> 00:25:18,880 manually and of course Al interpreter 655 00:25:18,880 --> 00:25:21,600 session uh right over there died uh 656 00:25:21,600 --> 00:25:23,799 because we you know we signed out so we 657 00:25:23,799 --> 00:25:25,760 didn't set up persistence so we can just 658 00:25:25,760 --> 00:25:28,520 terminate that there and we list out our 659 00:25:28,520 --> 00:25:30,559 sessions uh I think we've lost all our 660 00:25:30,559 --> 00:25:33,320 sessions do we have um there we are 661 00:25:33,320 --> 00:25:36,080 there we are okay so what we can do is 662 00:25:36,080 --> 00:25:39,840 generate a new um it looks like that job 663 00:25:39,840 --> 00:25:40,799 is still 664 00:25:40,799 --> 00:25:45,080 running uh yeah so job skill and we can 665 00:25:45,080 --> 00:25:46,840 then hit exploit again generate the 666 00:25:46,840 --> 00:25:48,520 power Shell Code execute it with the 667 00:25:48,520 --> 00:25:50,440 admin user and we'll then get a 668 00:25:50,440 --> 00:25:52,600 meterpreter session with administrative 669 00:25:52,600 --> 00:25:55,080 privileges all right so I think I've 670 00:25:55,080 --> 00:25:57,320 covered how to use win peas as I said 671 00:25:57,320 --> 00:25:59,440 you can take a look at the help menu if 672 00:25:59,440 --> 00:26:01,600 you're looking for specific sets of 673 00:26:01,600 --> 00:26:03,840 information uh but I would recommend you 674 00:26:03,840 --> 00:26:06,000 know running it at least um at least 675 00:26:06,000 --> 00:26:07,880 once uh running it by the default 676 00:26:07,880 --> 00:26:09,760 configuration at least once and then 677 00:26:09,760 --> 00:26:11,720 going through all the information step 678 00:26:11,720 --> 00:26:13,240 by step because you really don't want to 679 00:26:13,240 --> 00:26:15,520 miss out anything there all right so now 680 00:26:15,520 --> 00:26:17,200 that we've taken a look at how to 681 00:26:17,200 --> 00:26:19,440 identify these vulnerabilities these 682 00:26:19,440 --> 00:26:22,039 privilege escalation uh vulnerabilities 683 00:26:22,039 --> 00:26:24,039 in the next set of uh set of videos will 684 00:26:24,039 --> 00:26:26,120 be exploring these privilege escalation 685 00:26:26,120 --> 00:26:28,559 attack vectors and taking a look at they 686 00:26:28,559 --> 00:26:30,600 can be exploited in order to elevate our 687 00:26:30,600 --> 00:26:32,919 privileges uh we've already explored one 688 00:26:32,919 --> 00:26:34,760 of them but I didn't want to get into 689 00:26:34,760 --> 00:26:36,320 that but I just wanted to show you how 690 00:26:36,320 --> 00:26:39,919 powerful uh this tool is um all right so 691 00:26:39,919 --> 00:26:41,520 that's going to be it as I said uh the 692 00:26:41,520 --> 00:26:43,440 log for Shell video will be coming out 693 00:26:43,440 --> 00:26:45,000 so stay tuned for that it's going to be 694 00:26:45,000 --> 00:26:46,480 an in-depth video that covers 695 00:26:46,480 --> 00:26:49,399 exploitation as well as patching uh and 696 00:26:49,399 --> 00:26:50,960 yeah we'll be taking a look at that as 697 00:26:50,960 --> 00:26:52,760 well let me know what you guys think in 698 00:26:52,760 --> 00:26:54,120 the comment section if you want to reach 699 00:26:54,120 --> 00:26:56,039 out to me you can do so on our Discord 700 00:26:56,039 --> 00:26:57,960 server uh the link to that is in the 701 00:26:57,960 --> 00:26:59,279 description description section or you 702 00:26:59,279 --> 00:27:02,200 can contact me directly via Twitter and 703 00:27:02,200 --> 00:27:03,799 yeah thank you very much for watching 704 00:27:03,799 --> 00:27:07,840 and I'll be seeing you guys in the next 705 00:27:07,840 --> 00:27:10,640 video a huge thank you to all of our 706 00:27:10,640 --> 00:27:12,480 patreons your support is greatly 707 00:27:12,480 --> 00:27:14,240 appreciated and this is a formal thank 708 00:27:14,240 --> 00:27:16,720 you so thank you Shamir Douglas Ryan car 709 00:27:16,720 --> 00:27:19,919 sandor Michael Busby sidab doozy deim 710 00:27:19,919 --> 00:27:22,360 Bari Dustin umpr and Michael Hubbard 711 00:27:22,360 --> 00:27:24,279 your support is greatly appreciated and 712 00:27:24,279 --> 00:27:26,200 you keep us making even more high 713 00:27:26,200 --> 00:27:28,440 quality content for you guys so thank 714 00:27:28,440 --> 00:27:31,440 you 715 00:27:34,080 --> 00:27:37,180 [Music]51681

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.