Automation Enumeration

WinPEAS

WinPEAS is part of the PEAS (Privilege Escalation Awesome Scripts) suite. It is a script designed to automate the process of finding potential privilege escalation vectors on Windows systems.

Usage:

  • Download the winpeas.exe file from the repository.

  • Upload the file to the target system and execute it.

    peas.exe
  • The script will provide detailed output regarding misconfigurations, unquoted service paths, installed applications, and more.

Link: WinPEAS


Sherlock

Sherlock is a PowerShell script that scans for known vulnerabilities in the Windows operating system that can be exploited for privilege escalation.

Usage:

  • Download Sherlock.ps1.

  • Run it in a PowerShell session with the command:

  powershell -ep bypass
  .\\Sherlock.ps1
  • The script will identify any exploitable vulnerabilities present in the system.

Link: Sherlock


Watson

Watson is a vulnerability scanner that helps identify vulnerabilities based on the system’s patch level. It’s used to identify missing patches or configurations that could lead to privilege escalation.

Usage:

  • Download Watson.exe or compile it.

  • Run the executable in the system:

Watson.exe

Link: Watson


PowerUp

PowerUp is part of PowerSploit, a collection of PowerShell scripts that can be used for post-exploitation. PowerUp specifically looks for privilege escalation opportunities on Windows systems.

Usage:

  • Download PowerUp.ps1.

  • Run the script in PowerShell:

    powershell -ep bypass
    .\\PowerUp.ps1
  • PowerUp will scan the system for various weaknesses like service misconfigurations, registry key permissions, etc.

Link: PowerUp


Windows Exploit Suggester

This tool compares the patch level of the target system against the latest security bulletins from Microsoft to suggest potential privilege escalation vulnerabilities.

Usage:

  • Clone the repository.

  • Update the database:

  ./windows-exploit-suggester.py --update

Use the tool to compare the system info:

  ./windows-exploit-suggester.py --database <db.xls> --systeminfo <sysinfo.txt>

Link: Windows Exploit Suggester

Last updated