Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.
|
privilege_escalation [2024/05/31 15:13] M0N5T3R |
privilege_escalation [2024/06/04 12:02] (Version actuelle) M0N5T3R |
||
|---|---|---|---|
| Ligne 15: | Ligne 15: | ||
| https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 | https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 | ||
| https://github.com/Dec0ne/KrbRelayUp | https://github.com/Dec0ne/KrbRelayUp | ||
| + | https://github.com/GhostPack/Certify | ||
| + | https://github.com/mandiant/ADFSDump | ||
| Ligne 70: | Ligne 72: | ||
| * https://github.com/enjoiz/Privesc | * https://github.com/enjoiz/Privesc | ||
| * https://github.com/GhostPack/Seatbelt | * https://github.com/GhostPack/Seatbelt | ||
| + | * https://github.com/knight0x07/ImpulsiveDLLHijack | ||
| + | * https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1 | ||
| * site:exploit-db.com privilege escalation windows 7 | * site:exploit-db.com privilege escalation windows 7 | ||
| * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits | * https://github.com/abatchy17/WindowsExploits - Collection of precompiled Windows exploits | ||
| Ligne 81: | Ligne 85: | ||
| *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used | *-> post/multi/recon/local_exploit_suggester - suggests local meterpreter exploits that can be used | ||
| *-> post/windows/gather/enum_patches - helps to identify any missing patches | *-> post/windows/gather/enum_patches - helps to identify any missing patches | ||
| + | |||
| + | |||
| Ligne 144: | Ligne 150: | ||
| **Linux Privilege Escalation using SUID Binaries** | **Linux Privilege Escalation using SUID Binaries** | ||
| https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ | https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/ | ||
| + | |||
| + | |||
| + | |||
| + | |||
| **Escalate to root using pkexec** | **Escalate to root using pkexec** | ||
| Ligne 255: | Ligne 265: | ||
| LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS | LinPEAS - Linux Privilege Escalation Awesome Script https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS | ||
| + | Linux enumeration tools for pentesting and CTFs - https://github.com/diego-treitos/linux-smart-enumeration | ||
| **auto exploit** | **auto exploit** | ||