Privilege escalation
Chekcing for system type
systeminfo
I found that it is using x86 architecture. So, I will transfer x86 version of winpeas and run it.
Transfer the file.

Not able to run it.
Impersonating user.
The current user is the web server user (livda\apache). This user has the SeImpersonatePrivilege enabled. Using this privilege, we can attempt to escalate privileges and gain access as the NT AUTHORITY\SYSTEM user. Let’s proceed with abusing this privilege.
Not working.


Working {took help}
I will be using this exploit.
I have complited the exploit. Now i will send it to victim machine.
Run it.
You will get the shell as NT System user.

Last updated
Was this helpful?