Windows Privilege Escalation - Writable Service Executable

Поделиться
HTML-код
  • Опубликовано: 28 окт 2024

Комментарии • 35

  • @Haxr-dq6wt
    @Haxr-dq6wt 3 года назад +11

    Another 12 minutes of pure talent.
    Please continue with the Priv esc series Conda

    • @c0nd4
      @c0nd4  3 года назад +1

      Will do! Thank you for the kind words!

  • @TalsonHacks
    @TalsonHacks 3 года назад +1

    Let's make this a series! A really awesome and clear way of explanation. Thank you for posting!

    • @c0nd4
      @c0nd4  3 года назад

      Thank you! Glad you liked it!

  • @ca7986
    @ca7986 3 года назад +3

    Yeah please consider making more on Windows priv esc

    • @c0nd4
      @c0nd4  3 года назад +2

      More should be coming soon 😁

    • @ca7986
      @ca7986 3 года назад

      @@c0nd4 ❤️👌🌟

  • @sajidshamir
    @sajidshamir 3 года назад +1

    i love the way you explain things, loud and clear, will be thankful if you consider pass the hash, pass the ticket, over pass the hash, some kerborous attack, psexec, and llmnr, nbtdns on windows and few more attack..

    • @c0nd4
      @c0nd4  3 года назад

      Thank you! I do plan on covering those on the domain that we set up before. Stay tuned!

  • @jaybailey216
    @jaybailey216 3 года назад +2

    Wow I never knew msfvenom had an adduser option although I probably should have 😂! That's awesome! Great video!

    • @c0nd4
      @c0nd4  3 года назад +1

      Thanks! I didn't know about that option for a while either, but it's a game changer for sure.

    • @jaybailey216
      @jaybailey216 3 года назад +1

      @@c0nd4 yeah it is! That would've helped on my first attempt!

  • @montala3380
    @montala3380 2 года назад +1

    Hi Conda,
    How to create a vuln service as in your demo?

  • @razaabbas5668
    @razaabbas5668 2 года назад

    Hey are you planning to do the review on OSEP? I want to know how an OSCP person can get OSEP

  • @tt-fx6nt
    @tt-fx6nt 2 года назад +3

    0:48 wmic service get name, startname, pathname
    4:45 msfvenom -p windows/adduser USER=backdoor_admin PASS=PleaseSub! -f exe > service.exe
    Hi Brandon, great video as always. However the font is very small, probably you can zoom it in to make it easy to be read. Thanks and keep up the good work.

    • @c0nd4
      @c0nd4  2 года назад

      Thanks for the feedback! I've tried to adjust this in newer videos to make it easier to see.

  • @sajidshamir
    @sajidshamir 3 года назад +1

    Great work.. ya need to see some more..

    • @c0nd4
      @c0nd4  3 года назад

      Thank you! I do plan on making more soon

  • @vaibhavbhavsar8550
    @vaibhavbhavsar8550 2 года назад +1

    Bro you are a really good teacher i like the way you teach
    Love from india

    • @c0nd4
      @c0nd4  2 года назад

      Thank you very much!

  • @scout17s17
    @scout17s17 3 года назад +1

    Really nice Video thank you 👍🏽

    • @c0nd4
      @c0nd4  3 года назад

      No problem 😁

  • @davidfishwick5573
    @davidfishwick5573 5 месяцев назад

    I can't think of a single service that allows a standard user the permission modify the executable file.

    • @c0nd4
      @c0nd4  5 месяцев назад

      I've seen this many times in real life engagements and bug bounty programs. You'd be surprised.

  • @ajaykumark107
    @ajaykumark107 3 года назад +1

    Please make more videos

  • @ca7986
    @ca7986 3 года назад

    ❤️👌