Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.
privilege_escalation [2024/05/31 15:13] M0N5T3R |
privilege_escalation [2024/06/04 12:02] (Version actuelle) M0N5T3R |
||
---|---|---|---|
Ligne 15: | Ligne 15: | ||
https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 | https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 | ||
https://github.com/Dec0ne/KrbRelayUp | https://github.com/Dec0ne/KrbRelayUp | ||
+ | https://github.com/GhostPack/Certify | ||
+ | https://github.com/mandiant/ADFSDump | ||
Ligne 70: | Ligne 72: | ||
* https://github.com/enjoiz/Privesc | * https://github.com/enjoiz/Privesc | ||
* https://github.com/GhostPack/Seatbelt | * https://github.com/GhostPack/Seatbelt | ||
+ | * https://github.com/knight0x07/ImpulsiveDLLHijack | ||
+ | * https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1 | ||
* site:exploit-db.com privilege escalation windows 7 | * site:exploit-db.com privilege escalation windows 7 | ||
* https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits | * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits | ||
Ligne 81: | Ligne 85: | ||
*-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used | *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used | ||
*-> post/windows/gather/enum_patches - helps to identify any missing patches | *-> post/windows/gather/enum_patches - helps to identify any missing patches | ||
+ | |||
+ | |||
Ligne 144: | Ligne 150: | ||
**Linux Privilege Escalation using SUID Binaries** | **Linux Privilege Escalation using SUID Binaries** | ||
https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ | https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ | ||
+ | |||
+ | |||
+ | |||
+ | |||
**Escalate to root using pkexec** | **Escalate to root using pkexec** | ||
Ligne 255: | Ligne 265: | ||
LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS | LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS | ||
+ | Linux enumeration tools for pentesting and CTFs - https://github.com/diego-treitos/linux-smart-enumeration | ||
**auto exploit** | **auto exploit** |