Windows Privilege Escalation: Pillaging

Hello,
Has anyone solved the optional task in this module?

I tried evil-winrm, xfreerdp with /pth: and cracking the hash with hashcat using couple of the wordlists from the seclist. Any suggestions?

Much obliged

bf

1 Like

Hello. Did you solve this optional exercise or anyone else? I would really appreciate some help with it as I don’t see how can I pth without higher privs like local admin account or SeDebug.