inframedium

Лучник (Archer)

hackerlab

Task: Windows Server 2016 pentest with MSSQL Server 2022. Solution: Exploited default sa:sa credentials, used xp_cmdshell for RCE, then escalated to SYSTEM via JuicyPotatoNG abusing SeImpersonatePrivilege.

$ ls tags/ techniques/
MSSQL default credentials exploitation (sa:sa)xp_cmdshell for Remote Code ExecutionSeImpersonatePrivilege abuseJuicyPotatoNG privilege escalation to SYSTEM

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]