WinPrivEsc Enumeration
Situational Awareness
After compromising a machine, this the information we need to gather that can help us to Privilege Escalate
- Username and hostname
- Group memberships of the current user
- Existing users and groups
- Operating system, version and architecture
- Network information
- Installed applications
- Running processesEnumerate User
Using CMD
whoami
whoami /groups
whoami /privUsing Powershell
Get-LocalUser
Get-LocalGroup
Get-LocalGroupMember $user
Get-LocalGroup $groupnameEnumerate Hostname
Enumerate Network
Installed Application
Process
Hidden in Plain View
User might put Information in open directory that anyone can access
PowerShell History
We can get interesting information from PowerShell
Get list of command executed in the past
Clear-History just clear PowerShell own history but not PSReadline. We can grab it using below command.
Automated Tools
winPeas
PowerView
JAWS
Last updated
Was this helpful?