GPO modification attack
Assumptions
Case 1
Enumeration

Exploitation
1. Add a user to the Local Administrator and run psexec (requires the user's password)
2. Create a task that runs netcat or powershell reverse shell back to Kali
Case 2
Enumeration

Last updated