Windows privilege escalation

Manual enumeration

User

whoami
net user username

Other Users

net user

Privileges

whoami /priv

Hostname

hostname

OS and architecture

systeminfo
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"

Processes and services

Network

Firewall/AV status

Applications/patch levels/drivers/kernel modules

Readable/writeable directories

Mounted/unmounted disks

Passwords

Scheduled tasks

Binaries that auto elevate

Automated tools

windows-exploit-suggester.py

  • Run systeminfo and save the output into a text document

  • Update the database - ./windows-exploit-suggester.py --update

  • ./windows-exploit-suggester.py --database DBNameHere --systeminfo filepath.txt

Metasploit exploit suggester

  • Background session background

  • Select exploit to use

  • Set Session

  • Set LHOST and LPORT

  • Run

Last updated