NOTE: This is solely just commands that help me to refer back when I am doing a pentest. Nothing technical here.
For Windows, using meterpreter MIGRATE function to migrate the shell into other process
Better to have SYSTEM Priv . So that we can migrate to SYSTEM process
getsystemgetuidUser Account Controlwhoami /priv vs Meterpreter : run win_privsToken Impersonation - Incognito, Juicy Potato, Rotten Potato.
load incognito +[user]getuidwmic service get name,displayname,pathname,startmode | findstr /i 'auto' | findstr /i /v "c:\\windows\\\\" | findstr /i /v """trusted_service_path module in MSF.sc qc [SERVICE]psexec smbexec, wmiexec. Meterpreter. NOTE - sometimes local admin group is not enough, This is because typically presents itself when trying to pass-the-hash. which isn't an actual administrator (RID-500) rather, from an account that is in the Adwministrator group.STATUS_ACCESS_DENIED (Commands=117 WordCount=0) error, this is a good indication that registry changes may be required on the target machine.HKEY_LOCAL_MACHINE\\SOFTWARE\\MICROSOFT\\Windows\\CurrentVersion\\Policies\\System - ADD a new DWORD named LocalAccountTokenPolicy set value to 1.HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\LanManServer\\Parameters - ADD a new DWORD named RequireSecuritySignature and set value to 0.Set-ItemPropery -Path HKLM:\\software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System -Name LocalAccountTokenFilterPolicy -Value 1 -Type DwordRequireSecuritySignature