hacktricks/windows-hardening/windows-local-privilege-escalation/powerup.md
2022-12-05 23:29:21 +01:00

3.4 KiB

🎙️ HackTricks LIVE Twitch Wednesdays 5.30pm (UTC) 🎙️ - 🎥 Youtube 🎥

Invoke

powershell -ep bypass
. .\powerup.ps
Invoke-AllChecks

Checks

03/2019

  • Current privileges
  • Unquoted service paths
  • Service executable permissions
  • Service permissions
  • %PATH% for hijackable DLL locations
  • AlwaysInstallElevated registry key
  • Autologon credentials in registry
  • Modifidable registry autoruns and configs
  • Modifiable schtask files/configs
  • Unattended install files
  • Encrypted web.config strings
  • Encrypted application pool and virtual directory passwords
  • Plaintext passwords in McAfee SiteList.xml
  • Cached Group Policy Preferences .xml files
🎙️ HackTricks LIVE Twitch Wednesdays 5.30pm (UTC) 🎙️ - 🎥 Youtube 🎥