Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.
|
privilege_escalation [2024/02/09 20:50] M0N5T3R |
privilege_escalation [2024/06/04 12:02] (Version actuelle) M0N5T3R |
||
|---|---|---|---|
| Ligne 15: | Ligne 15: | ||
| https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 | https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 | ||
| https://github.com/Dec0ne/KrbRelayUp | https://github.com/Dec0ne/KrbRelayUp | ||
| + | https://github.com/GhostPack/Certify | ||
| + | https://github.com/mandiant/ADFSDump | ||
| Ligne 51: | Ligne 53: | ||
| - | * WINPEAS Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz and check more information about how to exploit found misconfigurations in book.hacktricks.xyz https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS | + | * WINPEAS : WINPEAS Check the Local Windows Privilege Escalation checklist from book.hacktricks.xyz and check more information about how to exploit found misconfigurations in book.hacktricks.xyz https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS |
| + | * WindowsEnum :A Powershell Privilege Escalation Enumeration Script.z | ||
| + | https://github.com/absolomb/WindowsEnum | ||
| * Watson 2.0 : Windows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809 --- Server 2016 & 2019 https://github.com/rasta-mouse/Watson | * Watson 2.0 : Windows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809 --- Server 2016 & 2019 https://github.com/rasta-mouse/Watson | ||
| Ligne 68: | Ligne 72: | ||
| * https://github.com/enjoiz/Privesc | * https://github.com/enjoiz/Privesc | ||
| * https://github.com/GhostPack/Seatbelt | * https://github.com/GhostPack/Seatbelt | ||
| + | * https://github.com/knight0x07/ImpulsiveDLLHijack | ||
| + | * https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1 | ||
| * site:exploit-db.com privilege escalation windows 7 | * site:exploit-db.com privilege escalation windows 7 | ||
| * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits | * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits | ||
| Ligne 79: | Ligne 85: | ||
| *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used | *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used | ||
| *-> post/windows/gather/enum_patches - helps to identify any missing patches | *-> post/windows/gather/enum_patches - helps to identify any missing patches | ||
| + | |||
| + | |||
| Ligne 142: | Ligne 150: | ||
| **Linux Privilege Escalation using SUID Binaries** | **Linux Privilege Escalation using SUID Binaries** | ||
| https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ | https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ | ||
| + | |||
| + | |||
| + | |||
| + | |||
| **Escalate to root using pkexec** | **Escalate to root using pkexec** | ||
| Ligne 253: | Ligne 265: | ||
| LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS | LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS | ||
| + | Linux enumeration tools for pentesting and CTFs - https://github.com/diego-treitos/linux-smart-enumeration | ||
| **auto exploit** | **auto exploit** | ||