Elévation des privilèges - Windows

Enumération

Outils

  • winPEAS : https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS

Commandes

whoami /groups
Get-LocalUser
Get-LocalGroup
Get-LocalGroupMember Administrators
systeminfo
ipconfig /all
route print
netstat -ano
Get-Process
Get-History
type C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
Get-ScheduledTask
schtasks /query /fo LIST /v
set
dir env:
Get-ChildItem Env: | ft Key,Value
reg query HKLM /f password /t REG_SZ /s
reg query HKCU /f password /t REG_SZ /s
REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon" /v DefaultPassword
Get-WmiObject -class Win32_Service -Property Name, DisplayName, PathName, StartMode
wmic service get name,displayname,startmode,pathname

Fichiers Intéressants

Se connecter à un autre utilisateur

Exécuter un script avec mot de passe

Privilège

SeBackupPrivilege / SeRestorePrivilege

Ntds

Service Exploit

Insecure Service Permission

Unquoted Service Path

Registry

AlwaysInstallElevated

Password Extraction

Mis à jour