Automated Windows Enumeartion
We can also automate the enumeration for the privilege escalation by using some tools as given below
Tools for automating enumeration
tip
You can find these tools in your kali machine at `/usr/share/lists- To be updated '.
TODO
Common Windows Privilege Escalation Vectors
- Stored Credentials
- Windows Kernel Exploit --Done
- DLL Injection
- Unattended Answer File
- Insecure File/Folder Permissions
- Insecure Service Permissions
- DLL Hijacking --done
- Group Policy Preferences
- Unquoted Service Path --Done
- Always Install Elevated
- Token Manipulation
- Insecure Registry Permissions
- Autologon User Credential
- User Account Control (UAC) Bypass
- Insecure Named Pipes Permissions
TO DO ENUM tools
- Session Gopher
- JAWS
- Sherlock
- PowerUP
- Metasploit Windwos Gather Applied Patches
- Metasploit Local Exploit Suggester Module
- Be Root
- Privesc