WinPrivEsc Enumeration

Situational Awareness

  • After compromising a machine, this the information we need to gather that can help us to Privilege Escalate

- Username and hostname
- Group memberships of the current user
- Existing users and groups
- Operating system, version and architecture
- Network information
- Installed applications
- Running processes

Enumerate User

Using CMD

whoami
whoami /groups
whoami /priv

Using Powershell

Get-LocalUser
Get-LocalGroup
Get-LocalGroupMember $user
Get-LocalGroup $groupname

Enumerate Hostname

Enumerate Network

Installed Application

Process

Hidden in Plain View

  • User might put Information in open directory that anyone can access

PowerShell History

  • We can get interesting information from PowerShell

Get list of command executed in the past

Clear-History just clear PowerShell own history but not PSReadline. We can grab it using below command.

Automated Tools

  • winPeas

  • PowerView

  • JAWS

Last updated

Was this helpful?