Session Hijack
Windows
Session hijacking in Windows is a powerfull and easy way to pivot deeper into the AD environment.
Find logged in users
## Remotely using `netexec`
$ netexec smb <target> -u Administrator -H :<pw-hash> --local-auth --loggedon-users
...
SMB <target> 445 <hostname> [+] Enumerated logged_on users
SMB <target> 445 <hostname> DOM\username logon_server: DC.DOM.LOCAL
## Locally using cmd/powershell
> query user /server:127.0.0.1
USERNAME SESSIONNAME ID STATE IDLE TIME LOGON TIME
void console 2 Active none 2024-10-14 07:29
> qwinsta /server:127.0.0.1
SESSIONNAME USERNAME ID STATE TYPE DEVICE
console void 2 ActiveBase command
Usefull payloads
Web
Session cookies, find them and use them.
Last updated
Was this helpful?