Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to improve the authority by improving the running level of the program in big data's intranet penetration

2025-02-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

In this issue, the editor will bring you about how to improve the authority by improving the running level of the program in big data's intranet infiltration. The article is rich in content and analyzes and narrates it from a professional point of view. I hope you can get something after reading this article.

Environment: attack: Kali 2020, ippart 192.168.1.133

Received by: win7 x86 Phillips 192.168.1.137

First, generate Trojans and monitor hosts:

Elevate authority

Second, enhance the authority

1. Put the current session in the background, and background

2. Select the weighting module, use exploit/windows/local/ask

3. Check the parameters to be configured, show options

3. View and set the current sessions value, set session 2

4. Set the name of the pop-up program, set filename 360.exe

5. Run, the recipient will pop up a dialog box and click Yes to get the system permission.

3. UAC bypass (need to be in the management group)

1. Because the above method requires interaction, if you omit the step of interaction, you can use the following bypassuac module to bypass the pop-up window

2. Selection module: use exploit/windows/local/bypassuac

3. View and set the current sessions value, set session 1

4. Run, no need to interact

5. Use the command getuid to view the permissions, prompt or normal permissions, and then use the command getsystem to obtain the system permissions, and then use getuid to check the permissions and find them to obtain the system permissions. If you do not perform the above steps, use the command getsystem, and you will be prompted to obtain the failure.

The above is the big data intranet penetration shared by the editor, how to enhance the authority by improving the running level of the program. If you happen to have similar doubts, you might as well refer to the above analysis to understand. If you want to know more about it, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report