inframedium
Лучник (Archer)
hackerlab
Task: Windows Server 2016 pentest with MSSQL Server 2022. Solution: Exploited default sa:sa credentials, used xp_cmdshell for RCE, then escalated to SYSTEM via JuicyPotatoNG abusing SeImpersonatePrivilege.
$ ls tags/ techniques/
default_credentialsprivilege_escalationwindowsseimpersonateprivilegemssqlxp_cmdshelljuicypotatongwindows_server_2016impacketpotato_attack
MSSQL default credentials exploitation (sa:sa)xp_cmdshell for Remote Code ExecutionSeImpersonatePrivilege abuseJuicyPotatoNG privilege escalation to SYSTEM
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]