Outils d'utilisateurs

Outils du Site


privilege_escalation

Différences

Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.

Lien vers cette vue

privilege_escalation [2024/05/31 15:13]
M0N5T3R
privilege_escalation [2024/06/04 12:02] (Version actuelle)
M0N5T3R
Ligne 15: Ligne 15:
     https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4     https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4
     https://github.com/Dec0ne/KrbRelayUp     https://github.com/Dec0ne/KrbRelayUp
 +    https://github.com/GhostPack/Certify
 +    https://github.com/mandiant/ADFSDump
  
  
Ligne 70: Ligne 72:
   * https://github.com/enjoiz/Privesc   * https://github.com/enjoiz/Privesc
   * https://github.com/GhostPack/Seatbelt   * https://github.com/GhostPack/Seatbelt
 +  * https://github.com/knight0x07/ImpulsiveDLLHijack
 +  * https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1
   * site:exploit-db.com privilege escalation windows 7   * site:exploit-db.com privilege escalation windows 7
   * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits   * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits
Ligne 81: Ligne 85:
   *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used   *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used
   *-> post/windows/gather/enum_patches - helps to identify any missing patches   *-> post/windows/gather/enum_patches - helps to identify any missing patches
 +
 +
  
  
Ligne 144: Ligne 150:
 **Linux Privilege Escalation using SUID Binaries** **Linux Privilege Escalation using SUID Binaries**
 https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/
 +
 +
 +
 +
  
 **Escalate to root using pkexec** **Escalate to root using pkexec**
Ligne 255: Ligne 265:
 LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
  
 +Linux enumeration tools for pentesting and CTFs - https://github.com/diego-treitos/linux-smart-enumeration
  
 **auto exploit**  **auto exploit** 
privilege_escalation.1717161203.txt.gz · Dernière modification: 2024/05/31 15:13 (modification externe)