Tools

1. Tools Overview

This document provides an organized overview of enumeration and exploitation tools used for privilege escalation on Windows systems.

1.1 Enumeration Tools

These tools are essential for identifying vulnerabilities and misconfigurations that could lead to privilege escalation.

Tool

Description

PowerSploit’s PowerUp

PowerShell script for identifying and exploiting local privilege escalation vulnerabilities.

Watson

C# implementation for detecting vulnerabilities in Windows, similar to the deprecated Sherlock tool.

Sherlock (Deprecated)

PowerShell script for identifying missing patches for privilege escalation.

BeRoot

Cross-platform tool for privilege escalation checks on Windows, Linux, and Mac.

Windows Exploit Suggester (WES)

Suggests potential exploits based on system information and installed patches.

WindowsEnum

PowerShell script for privilege escalation enumeration on Windows.

Seatbelt

C# project for auditing security-related settings and configurations on Windows systems.

Powerless

Script focused on legacy Windows environments for privilege escalation enumeration.

JAWS

PowerShell script for comprehensive Windows enumeration.

winPEAS

Script for identifying privilege escalation vectors on Windows.

Windows Exploit Suggester - Next Generation (WES-NG)

Updated version of WES for accurate exploit suggestions.

PrivescCheck

Standalone executable for checking common privilege escalation vectors on Windows systems.


2. Privilege Escalation Techniques

2.1 Enumeration Tools: Usage Instructions

The following section details how to use specific enumeration tools to gather system information and identify potential vulnerabilities.


PowerSploit’s PowerUp

Usage:


Watson

Usage: Compile or download Watson to use in .NET environments.


Windows Exploit Suggester

Initial Steps:


Seatbelt

Full Security Check:


winPEAS

Usage: Download and execute winPEAS on the target machine.


2.2 Exploitation Tools

Once vulnerabilities are identified, these tools can assist in exploitation.


BeRoot

Usage: Run the appropriate version for the target OS and follow prompts for privilege escalation checks.


PrivescCheck

Usage:


JAWS

Usage:


Windows Exploit Suggester - Next Generation (WES-NG)

Usage:


3. Usage Instructions

3.1 Initial System Information Gathering

Begin by collecting essential system information for analysis and exploitation strategy development:


3.2 Updating and Running Windows Exploit Suggester

Update the Windows Exploit Suggester database and analyze the collected system information:


3.3 Running Seatbelt for a Comprehensive Check

Conduct a full security audit using Seatbelt:


3.4 Executing PowerUp

Scan for privilege escalation vulnerabilities using PowerUp:

Last updated