Windows privilege escalation
Manual enumeration
User
Other Users
Privileges
Hostname
OS and architecture
Processes and services
Network
Firewall/AV status
Applications/patch levels/drivers/kernel modules
Readable/writeable directories
Mounted/unmounted disks
Passwords
Scheduled tasks
Binaries that auto elevate
Automated tools
windows-exploit-suggester.py
Run
systeminfo
and save the output into a text documentUpdate the database -
./windows-exploit-suggester.py --update
.
/windows-exploit-suggester.py --database DBNameHere --systeminfo filepath.txt
Metasploit exploit suggester
Background session
background
Select exploit to use
Set Session
Set LHOST and LPORT
Run
Last updated