1
00:00:00,450 --> 00:00:00,740
All right.

2
00:00:00,750 --> 00:00:04,950
In this section we're going to be exploring the run as command.

3
00:00:04,980 --> 00:00:10,560
Now this is absolutely something you should be checking for when you log onto a Windows machine as a

4
00:00:10,620 --> 00:00:12,320
low level user.

5
00:00:12,480 --> 00:00:18,300
What the run as command does is it allows us to run a command as somebody else.

6
00:00:18,300 --> 00:00:22,840
So in this instance we're going to be using run as as the administrator.

7
00:00:22,920 --> 00:00:26,270
So we're going to do that on the box that you're gonna be seeing here soon.

8
00:00:26,270 --> 00:00:30,860
So it's going to be our previous technique and let's go ahead and talk about that.

9
00:00:30,870 --> 00:00:37,950
So on Hack the box we're going to be utilizing the box of access which is at Ten Top Ten Top Ten that

10
00:00:37,950 --> 00:00:38,640
98.

11
00:00:38,640 --> 00:00:42,210
So go ahead and start that and get your scan going.

12
00:00:42,240 --> 00:00:48,780
Now the one thing that I can tell you is if you're looking to explore this on your own and you should

13
00:00:48,780 --> 00:00:56,700
be is go ahead and note that you're going to be looking for a command key slash list.

14
00:00:56,700 --> 00:01:00,720
That is the command that's going to look for stored credentials on a machine.

15
00:01:00,720 --> 00:01:04,680
So if you do get a low level shell and you want to consider moving forward.

16
00:01:04,830 --> 00:01:07,050
Go ahead and run command key slash list.

17
00:01:07,050 --> 00:01:11,910
However a tool like wind peas or even a tool like Jaws.

18
00:01:11,910 --> 00:01:13,280
Some tools along those lines.

19
00:01:13,290 --> 00:01:18,300
Basic power shell scripts will run and will tell you this.

20
00:01:18,300 --> 00:01:21,990
Now this box is a little older so you're going to have to find the right tools that work.

21
00:01:22,020 --> 00:01:25,040
But if you do run that tool it will tell you as well.

22
00:01:25,110 --> 00:01:28,680
But we're going to utilize the command key slash list to just view this on our own.

23
00:01:29,100 --> 00:01:32,710
So those are some big hints on how we're going to take down this box.

24
00:01:32,760 --> 00:01:37,920
But now my challenge to you is to get the low level user first and then we'll work through this.

25
00:01:37,980 --> 00:01:42,690
So I'll catch you in the next video as you walk through the low level user and hopefully gain access

26
00:01:42,690 --> 00:01:43,250
to this machine.
