WinPrivEsc Enumeration
Situational Awareness
After compromising a machine, this the information we need to gather that can help us to Privilege Escalate
Enumerate User
Using CMD
Using Powershell
Enumerate Hostname
Enumerate Network
Installed Application
Process
Hidden in Plain View
User might put Information in open directory that anyone can access
PowerShell History
We can get interesting information from PowerShell
Get list of command executed in the past
Clear-History just clear PowerShell own history but not PSReadline. We can grab it using below command.
Automated Tools
winPeas
PowerView
JAWS
Last updated
Was this helpful?