Pentesting Quick Reference OSCP and Beyond
Ctrlk
  • Basic Tools & Techniques
  • Linux Basics
  • Windows Basics
  • Shells
  • Uploading Shells/ Transferring Files
  • FootPrinting
  • Host Discovery
  • Scanning
  • Vulnerability assessment
  • Metasploit and Meterpreter
  • Brute Forcing/ Password Cracking
  • Linux Remote Management Protocols
  • Windows Remote Management Protocols
  • Port 20/21 - FTP Pentesting
  • Port 22 SSH
  • Port 23 Telnet
  • Port 25 - SMTP
  • Port 53 DNS
  • Port 110/995 POP3 and IMAP 146/993
  • Port 111 -RPC Bind
  • Port 135 - RPC
  • Port 137 NetBios
  • Port 137, 138 UDP NMDB
  • Port 161 SNMP
  • Port 445 - SMB
  • Port 1433 - MSSQL
  • Port 1521 Oracle TNS
  • Port 1833 - MQTT
  • Port 2049 - NFS
  • Port 3306 MySQL
  • Port 3389 - RDP
  • Port 5985 - WINRM
  • Port 632 (UDP) IPMI
  • Redis (6379)
  • Port 10000 Webmin
  • Privilege Escalation
    • Windows Priv esc
      • Initial Enumeration
      • Automated Enumeration Tools
        • PowerUp Privilege Escalation
        • PrivescCheck.ps1
        • Winpeas
        • Meterpreter Exploit Suggester
        • Windows Exploit Suggester
      • Kernel Exploits
      • Unquoted service path vulnerability
      • Print Spooler
      • Bypassing UAC using the UACME tool
      • UAC Bypass: Memory Injection (Metasploit)
      • Impersonating access tokens on Windows with meterpreter
      • Meterpreter Kiwi plugin
    • Linux Priv esc
  • Active Directory
  • Web Pentesting
  • Cryptography
  • More Resources
  • Forensics
  • IoT Security
  • API Security
  • Binary Exploitation
  • Boxes/ Machines
  • Private Challenges
  • Misc tools
  • Clearing Tracks
  • SOC Analyst Resources
  • OSCP Tips and Misc
  • Mobile Hacking
  • Buffer Overflow
  • Linux Vulnerabilities
  • Different Applications Vulnerabilities
  • Web3 and Blockchain Security
  • WIFI Hacking
  • Misc Tricks
  • Social Engineering
  • Cloud Pentesting
    • AWS
Powered by GitBook
On this page
  1. Privilege Escalation
  2. Windows Priv esc

Automated Enumeration Tools

WinPEAS - https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS

Windows PrivEsc Checklist - https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation

Sherlock - https://github.com/rasta-mouse/Sherlock

Watson - https://github.com/rasta-mouse/Watson

PowerUp - https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc

JAWS - https://github.com/411Hall/JAWS

Windows Exploit Suggester - https://github.com/AonCyberLabs/Windows-Exploit-Suggester

Metasploit Local Exploit Suggester - https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/

Seatbelt - https://github.com/GhostPack/Seatbelt

SharpUp - https://github.com/GhostPack/SharpUp

PreviousInitial EnumerationNextPowerUp Privilege Escalation

Last updated 12 days ago