Enumeration
Ways To become Administrator
Reverse shells
Adding ourselves to the group
PsExec
Strat
whoami
net user <username>
Privileges
run the local exploit suggester
Run winPEAS
Run SeatBelt
Make a list of things you need to make the exploits work
Try to check passwords to RDP, runas
Check for user's Desktop and C:\ and C:\Program Files\
Then look at exploitdb and searchsploit for possible exploits. literally look at everything please
Try things that dont require a lot first
Check for ports running internally
Try Kernel Exploits
We can use accesschks and icacls to see permissions as well as dir /q /s to see ownership of files.
Last updated