Windows privilege escalation
Manual enumeration
User
whoami
net user usernameOther Users
net userPrivileges
whoami /privHostname
hostnameOS and architecture
systeminfo
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"Processes and services
Network
Firewall/AV status
Applications/patch levels/drivers/kernel modules
Readable/writeable directories
Mounted/unmounted disks
Passwords
Scheduled tasks
Binaries that auto elevate
Automated tools
windows-exploit-suggester.py
Run
systeminfoand save the output into a text documentUpdate the database -
./windows-exploit-suggester.py --update.
/windows-exploit-suggester.py --database DBNameHere --systeminfo filepath.txt
Metasploit exploit suggester
Background session
backgroundSelect exploit to use
Set Session
Set LHOST and LPORT
Run
Last updated