Page cover

Windows Enum & Privilege Escalation

LOCAL

Enumeration

-> Enumerates all local accounts

net user

-> Get information from a specific user

net user <user>

-> Check user privileges

whoami /priv

-> View groups you belong to

whoami /groups

-> View interfaces and network information

ipconfig /all

-> View all active TCP connections and the TCP and UDP ports the host is listening on

netstat -ant

-> List running processes

tasklist

-> View system tasks

schtasks

Privilege Escalation

Unquoted Service Path

-> Detection

-> Exploitation - attacker

-> Exploitation - windows

or

binPath - Services [PrivEsc]

-> Detection

or

-> Exploitation - Windows [PrivEsc]

https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suitearrow-up-right

SeImpersonatePrivilege

https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exearrow-up-right

Autorun

-> Detection - windows

-> Exploitation - kali

Startup Applications

-> Detection - Windows

-> msfvenom - Attacker VM

-> Exploitation - Windows

Bypass UAC

EventViewer

-> Step 1 - Kali

-> Step 2 - Win Owned

-> Step 3 - Win Owned

[+] Run a BypassUAC attack to elevate privileges to admin.

-> Step 4 -Kali

-> Step 5 - Win Owned

https://raw.githubusercontent.com/CsEnox/EventViewer-UACBypass/main/Invoke-EventViewer.ps1arrow-up-right

FodhelperBypass

https://raw.githubusercontent.com/winscripting/UAC-bypass/master/FodhelperBypass.ps1arrow-up-right

Capturing configuration file credentials

-> Powershell History

-> EXploiting Saved Windows Credentials

-> IIS Configuration

-> Retrieve Credentials from Software: PuTTY

-> Unattended Windows Installations

-> Identify

-> McAfee Enterprise Endpoint Security - Credentials used during installation

https://raw.githubusercontent.com/funoverip/mcafee-sitelist-pwd-decryption/master/mcafee_sitelist_pwd_decrypt.pyarrow-up-right

Windows Enumeration Tools

-> PowerUp.ps1

https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Privesc/PowerUp.ps1arrow-up-right

-> winPEASany.exe

https://github.com/carlospolop/PEASS-ng/tree/master/winPEASarrow-up-right

-> windows-privesc-check2.exe

https://github.com/pentestmonkey/windows-privesc-checkarrow-up-right

Last updated