Overview

Guides

Manual

Current users privs

Current user details (all)

List users

User details

List other logged in users

List user groups

Group details

Add user (interactive, requires user interaction)

Add user (non-interactive)

Add user to group (e.g. administrators)

Change password

System info

Patch level

Network connections

Scheduled tasks

Driver

Installed software (slow)

Alternative

Services

Antivirus

Searching files

DLL hijacking

Find a program with a missing dll, or make use for search path order, to execute your own dll.

Unquoted service path

Finding unqoated service paths

Check if we have write permission in a suitable path.

PowerShell

SMB

Mount smb share

Access with

Automated

Exploit Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. GitHub - AonCyberLabs/Windows-Exploit-Suggester Windows Exploit Suggester - Next Generation (WES-NG)

winPEAS

winPEAS

PowerSploit

PowerSploit

JAWS

JAWS

Watson

Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities GitHub - rasta-mouse/Watson

Seatbelt

Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives. GitHub - GhostPack/Seatbelt

Sherlock

Deprecated. Have a look at Watson instead.

PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. GitHub - rasta-mouse/Sherlock

Misc

File inside a file

Run as

Weak services

Replace files/programs running with SYSTEM permissions with exploited ones -> Check permissions icacls <file>

Last updated