Automated enumeration script
PowerUp
To run PowerUp, start a PowerShell session and use dot sourcing to load the script:
OR
SharpUp: (If Powershell is not available)
PowerUp & SharpUp are very similar tools that hunt for specific privilege escalation misconfigurations.
To run SharpUp, start a command prompt and run the executable:
Seatbelt
Seatbelt is an enumeration tool. It contains a number of enumeration checks.
It does not actively hunt for privilege escalation misconfigurations, but provides related information for further investigation.
To run all checks and filter out unimportant results:
To run specific check(s):
winPEAS
winPEAS is a very powerful tool that not only actively hunts for privilege escalation misconfigurations, but highlights them for the user in the results.
Before running, we need to add a registry key and then reopen the command prompt:
Run all checks while avoiding time-consuming searches:
Run specific check categories:
accesschk.exe
AccessChk is an old but still trustworthy tool for checking user access control rights.
You can use it to check whether a user or group has access to files, directories, services, and registry keys.
The downside is more recent versions of the program spawn a GUI “accept EULA” popup window. When using the command line, we have to use an older version which still has an /accepteula command line option.
Always do this first
Find all weak file permission per drive.
Find all weak folder permission per drive
PrivescCheck
This script aims to enumerate common Windows configuration issues that can be leveraged for local privilege escalation. It also gathers various information that might be useful for exploitation and/or post-exploitation.
Last updated