Windows privilege escalation
Manual enumeration
User
whoami
net user usernameOther Users
net userPrivileges
whoami /privHostname
hostnameOS and architecture
systeminfo
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"Processes and services
Network
Firewall/AV status
Applications/patch levels/drivers/kernel modules
Readable/writeable directories
Mounted/unmounted disks
Passwords
Scheduled tasks
Binaries that auto elevate
Automated tools
windows-exploit-suggester.py
Metasploit exploit suggester
Last updated