Another banger, well explained, well presented, well exploited thank you!
@c0nd43 жыл бұрын
Thank you for the kind words 😁
@dawnsix3 жыл бұрын
Your content is really good man, much appreciated.
@c0nd43 жыл бұрын
No problem! I appreciate the support!
@programmingcheatsheet3 жыл бұрын
Stumbled on this video looking for details on a homework assignment, and as someone with no previous experience doing anything security related this was well done and coherent enough for me to follow. Liked, subbed, & bookmarked. Don't stop making videos like this
@bex39113 жыл бұрын
Great explained realy helped me out 😁 ... cant wait for more WindosPrivesc Vids.
@c0nd43 жыл бұрын
Thank you! Glad I could help. If all goes as planned, there could be a new windows priv esc video out tomorrow 😉
@travispatt9076 ай бұрын
You are awesome, thank you. This helped me so much with understanding some material for Pentest+.
@kallikantzaros Жыл бұрын
Born to be educator :) Well put my friend, explained it very well like in your other videos.
@c0nd4 Жыл бұрын
Thank you!
@waltzofthestars20783 жыл бұрын
wonderfully explained, makes it seem simple af while also noting every little detail. Thanks!
@c0nd43 жыл бұрын
No problem! Thank you for the feedback, I appreciate it 🙂
@will227inyoface2 Жыл бұрын
Are you still making videos? I just found this while studying for my PenTest+ and this content is fantastic! Subscribed!
@tomyates53462 жыл бұрын
Good stuff. Clear and concise explanation. Thanks!
@HK-sw3vi3 жыл бұрын
had to login to say how good this video is. thanks a bunch man
@c0nd43 жыл бұрын
Thank you!
@wolfgang-lj2hp2 жыл бұрын
Very well explained and demonstrated. Thanks
@ajaykumark1073 жыл бұрын
Keep them coming!
@aahringer Жыл бұрын
It would be great to talk about how Windows Defender/AV/EDR and AMSI react to well known tools like PowerSploit and default payloads from msfvenom as they would likely cause an alert to the blue team or be blocked entirely in many situations.
@skyredfive2 жыл бұрын
Very nicely explained! Came across this video while researching for my assignment. Can I confirm what is the CVE for this vulnerability and which Microsoft patch remediates this vulnerability? This information would be useful for my assignment and my own try out on my VM. Thanks!
@volodymyrgorbachov3 жыл бұрын
That was perfect! Thank you!
@c0nd43 жыл бұрын
Thanks!
@bernietamberg8581 Жыл бұрын
excellent video.
@madhavnakar93963 жыл бұрын
Another great video, thank you. Any tips about how to use this when powershell is not available on a box? I frequently come across boxes that when I run powershell commands, the reverse shell drops, which can be frustrating.
@c0nd43 жыл бұрын
Thank you! If you don't have powershell available, you can find services that have unquoted paths with a wmic command. I don't remember the syntax off the top of my head, but I'm sure you can find out online. Good luck!
@slythx52313 жыл бұрын
Hi@@c0nd4, that must be "wmic service get pathname,startname", right? But this is manual checking. How can we automate this or at least lessen the output for the unquoted path services only?
@c0nd43 жыл бұрын
Try this command: wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v "C:\Windows\\" | findstr /i /v """
@slythx52313 жыл бұрын
I think this will work: wmic service get pathname,startmode | findstr /V "C:\Windows\\" | findstr /i /v "c:\" | findstr /i /v """
@c0nd43 жыл бұрын
Great minds think alike 😉
@Saw-o3h6 ай бұрын
why you didnt do last part in terminal? we dont have access to the rdp. this part wasnt good actually. I know how to do that but many people dont and come here to leran mate. I wish you did last part in terminal too. thanks
@scout17s173 жыл бұрын
Thank you very much!
@c0nd43 жыл бұрын
No problem!
@koushiksuthar953 жыл бұрын
Very helpful 👍
@c0nd43 жыл бұрын
Glad to hear. Thanks!
@ytg66632 жыл бұрын
Gow can i automate it using c++ programmatically ?
@MrJingy083 жыл бұрын
excellent stuff
@c0nd43 жыл бұрын
Thank you!
@Waseemakram-eb9ws3 жыл бұрын
awesome man
@c0nd43 жыл бұрын
Thanks!
@aryavrata45423 жыл бұрын
I don't have vulnservice running in my services.
@c0nd43 жыл бұрын
Sorry if it that wasn't clear. Windows does not come with a service called "VulnService". I created that for the video. You can create this service using the "sc create" command if you'd like to try it. Good luck!
@roya20453 жыл бұрын
Hi if i have the domain admin password i can access the local systems in my domain using the password. But if i want to access a system that is connected to local Lan but without being in domain how can I gain access to that system I tried using my domain admin password on that system but seems like that does not work. Please reply
@c0nd43 жыл бұрын
A domain administrator password will only work on domain joined machines
@taiquangong99122 жыл бұрын
Done this on THM and was missing a step.
@icarus16563 жыл бұрын
good video
@c0nd43 жыл бұрын
Thanks!
@aulisarinili72972 жыл бұрын
Windows part seemed so hard to me.
@anntakamaki1960 Жыл бұрын
Why does Windows look for the file like that? Seems kind of dumb for Windows to do that.
@jamalnasir56482 жыл бұрын
So how do you fix this? Should have explained that as well
@c0nd42 жыл бұрын
Put quotes around the service path
@jamalnasir56482 жыл бұрын
@@c0nd4 Thanks. I found the settings in the registry to change to quotes