Disclaimer: This material is provided solely for educational purposes.
You are fully responsible for how
you use the information.
We
do not encourage any kind of illegal or harmful activity.
- Run Winpeas gathers extensive information about the system.
.\winpeas.exe cmd > output.txt
- Seatbelt: Use this alongside other scripts to cover a broader range of checks.
.\Seatbelt.exe -group=all -full > output.txt
- Manual Commands: If scripts fail, refer to manual enumeration commands available in the enumeration section.
STEP 2. REVIEW AND ANALYZE ENUMERATION RESULTS
- Spend Time Reviewing Results: Tools like winPEAS and Seatbelt provide extensive output. Take your time to understand the information.
- Make notes of interesting findings: Document anything unusual or potentially useful, such as misconfigurations, sensitive files, and permissions.
- Avoid rabbit holes: Focus on the most promising leads and avoid spending too much time on less likely paths.
STEP 3. FILE AND DIRECTORY INSPECTION
- Look for files in common directories: Directories to inspect include
C:\
, C:\Program Files
, C:\Users\Public\Desktop
.
- Read through any interesting files: Files may contain credentials, configuration details, or other information useful for privilege escalation.
STEP 4. QUICK WINS
- Prioritize simple methods: Focus on methods that require fewer steps, such as registry exploits and service misconfigurations.
- Check administrative processes: Note their versions and search for known exploits.
- Identify Internal Ports: Look for ports that can be forwarded to your attacking machine.
STEP 5. RE-EVALUATE ENUMERATION DATA
- Review All Gathered Data Again: If you haven't achieved privilege escalation, re-read your full enumeration data.
- Highlight anything unusual: Focus on unfamiliar processes, file names, or user names.
- Consider kernel exploits: Assess the potential for kernel exploits at this stage.
GENERAL TIPS
- Stay Calm and Focused: Privilege escalation is often a multi-step process that requires careful attention to detail.
- Be Patient: Results may not be immediate. Take your time to analyze and understand the environment.
- Keep Notes: Document your findings meticulously. A small piece of information might become crucial later.
- Use Multiple Tools: Different tools might reveal different information. Cross-reference findings from tools like winPEAS, Seatbelt, and manual commands.
- Focus on Quick Wins: Identify and exploit low-hanging fruits such as weak permissions, misconfigured services, and stored credentials.
- Be Ready to Adapt: If an initial approach fails, reassess the situation and be prepared to try alternative methods.