Outils d'utilisateurs

Outils du Site


privilege_escalation

Différences

Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.

Lien vers cette vue

privilege_escalation [2024/02/09 20:50]
M0N5T3R
privilege_escalation [2024/06/04 12:02] (Version actuelle)
M0N5T3R
Ligne 15: Ligne 15:
     https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4     https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4
     https://github.com/Dec0ne/KrbRelayUp     https://github.com/Dec0ne/KrbRelayUp
 +    https://github.com/GhostPack/Certify
 +    https://github.com/mandiant/ADFSDump
  
  
Ligne 51: Ligne 53:
  
  
-  * WINPEAS Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz  and check more information about how to exploit found misconfigurations in book.hacktricks.xyz https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS+  * WINPEAS : WINPEAS Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz  and check more information about how to exploit found misconfigurations in book.hacktricks.xyz https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS
  
 +  * WindowsEnum :A Powershell Privilege Escalation Enumeration Script.z
 +https://github.com/absolomb/WindowsEnum
  
   * Watson 2.0 : Windows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809 --- Server 2016 & 2019 https://github.com/rasta-mouse/Watson   * Watson 2.0 : Windows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809 --- Server 2016 & 2019 https://github.com/rasta-mouse/Watson
Ligne 68: Ligne 72:
   * https://github.com/enjoiz/Privesc   * https://github.com/enjoiz/Privesc
   * https://github.com/GhostPack/Seatbelt   * https://github.com/GhostPack/Seatbelt
 +  * https://github.com/knight0x07/ImpulsiveDLLHijack
 +  * https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1
   * site:exploit-db.com privilege escalation windows 7   * site:exploit-db.com privilege escalation windows 7
   * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits   * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits
Ligne 79: Ligne 85:
   *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used   *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used
   *-> post/windows/gather/enum_patches - helps to identify any missing patches   *-> post/windows/gather/enum_patches - helps to identify any missing patches
 +
 +
  
  
Ligne 142: Ligne 150:
 **Linux Privilege Escalation using SUID Binaries** **Linux Privilege Escalation using SUID Binaries**
 https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/
 +
 +
 +
 +
  
 **Escalate to root using pkexec** **Escalate to root using pkexec**
Ligne 253: Ligne 265:
 LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
  
 +Linux enumeration tools for pentesting and CTFs - https://github.com/diego-treitos/linux-smart-enumeration
  
 **auto exploit**  **auto exploit** 
privilege_escalation.1707508242.txt.gz · Dernière modification: 2024/02/09 20:50 par M0N5T3R