diff options
author | PowerShellMafia <PowerShellMafia@users.noreply.github.com> | 2015-12-18 16:33:59 -0800 |
---|---|---|
committer | PowerShellMafia <PowerShellMafia@users.noreply.github.com> | 2015-12-18 16:33:59 -0800 |
commit | 9e771d15bf19ab3c2ac196393c088ecdab6c9a73 (patch) | |
tree | 58927893ecb9289ad1de64d3a67eb58d00e4b762 /Privesc/README.md | |
parent | 9f78286ea7b0ec65d2aa09893a076864dd8d14e9 (diff) | |
parent | 9f183e36518176c4299eed5c68b7deac7f4e8025 (diff) | |
download | PowerSploit-3.0.0.tar.gz PowerSploit-3.0.0.zip |
Merge pull request #102 from PowerShellMafia/devv3.0.0
Merge 3.0 release changes
Diffstat (limited to 'Privesc/README.md')
-rw-r--r-- | Privesc/README.md | 59 |
1 files changed, 59 insertions, 0 deletions
diff --git a/Privesc/README.md b/Privesc/README.md new file mode 100644 index 0000000..bb68a43 --- /dev/null +++ b/Privesc/README.md @@ -0,0 +1,59 @@ +To install this module, drop the entire Privesc folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable. + +The default per-user module path is: "$Env:HomeDrive$Env:HOMEPATH\Documents\WindowsPowerShell\Modules" +The default computer-level module path is: "$Env:windir\System32\WindowsPowerShell\v1.0\Modules" + +To use the module, type `Import-Module Privesc` + +To see the commands imported, type `Get-Command -Module Privesc` + +For help on each individual command, Get-Help is your friend. + +Note: The tools contained within this module were all designed such that they can be run individually. Including them in a module simply lends itself to increased portability. + + +## PowerUp + +PowerUp aims to be a clearinghouse of common Windows privilege escalation +vectors that rely on misconfigurations. + +Running Invoke-AllChecks will output any identifiable vulnerabilities along +with specifications for any abuse functions. The -HTMLReport flag will also +generate a COMPUTER.username.html version of the report. + +Author: @harmj0y +License: BSD 3-Clause +Required Dependencies: None +Optional Dependencies: None + + +### Service Enumeration: + Get-ServiceUnquoted - returns services with unquoted paths that also have a space in the name + Get-ServiceFilePermission - returns services where the current user can write to the service binary path or its config + Get-ServicePermission - returns services the current user can modify + Get-ServiceDetail - returns detailed information about a specified service + +### Service Abuse: + Invoke-ServiceAbuse - modifies a vulnerable service to create a local admin or execute a custom command + Write-ServiceBinary - writes out a patched C# service binary that adds a local admin or executes a custom command + Install-ServiceBinary - replaces a service binary with one that adds a local admin or executes a custom command + Restore-ServiceBinary - restores a replaced service binary with the original executable + +### DLL Hijacking: + Find-DLLHijack - finds .dll hijacking opportunities for currently running processes + Find-PathHijack - finds service %PATH% .dll hijacking opportunities + Write-HijackDll - writes out a hijackable .dll + +### Registry Checks: + Get-RegAlwaysInstallElevated - checks if the AlwaysInstallElevated registry key is set + Get-RegAutoLogon - checks for Autologon credentials in the registry + Get-VulnAutoRun - checks for any modifiable binaries/scripts (or their configs) in HKLM autoruns + +### Misc.: + Get-VulnSchTask - find schtasks with modifiable target files + Get-UnattendedInstallFile - finds remaining unattended installation files + Get-Webconfig - checks for any encrypted web.config strings + Get-ApplicationHost - checks for encrypted application pool and virtual directory passwords + Write-UserAddMSI - write out a MSI installer that prompts for a user to be added + Invoke-AllChecks - runs all current escalation checks and returns a report + |