Windows
Cheatsheet
Vulnerabilities for Privesc
MS16-032 (Secondary Logon to Address Elevation of Privilege)
This module exploits the lack of sanitization of standard handles in Windows’ Secondary Logon Service. The vulnerability is known to affect versions of Windows 7-10 and 2k8-2k12 32 and 64 bit. This module will only work against those versions of Windows with Powershell 2.0 or later and systems with two or more CPU cores.
You can test it on Hack the box "Grandpa": - OS Name: Microsoft(R) Windows(R) Server 2003, Standard Edition - OS Version: 5.2.3790 Service Pack 2 Build 3790 - Hotfix(s): N/A
MS15-051 (Windows Kernel-Mode Drivers Could Allow Elevation of Privilege)
This security update resolves vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on locally and runs arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability cannot be exploited remotely or by anonymous users.
You can test it on Hack the box "Bastard": - OS Name: Microsoft Windows Server 2008 R2 Datacenter - OS Version: 6.1.7600 N/A Build 7600 - Hotfix(s): N/A
MS14-070 (TCP/IP Could Allow Elevation of Privilege)
A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys can allow a local attacker to trigger a NULL pointer dereference by using a specially crafted IOCTL. This flaw can be abused to elevate privileges to SYSTEM.
You can test it on Hack the box "Granny": - OS Name: Microsoft(R) Windows(R) Server 2003, Standard Edition - OS Version: 5.2.3790 Service Pack 2 Build 3790 - Hotfix(s): Q147222
MS10-015 (Windows Kernel Could Allow Elevation of Privilege)
This module will create a new session with SYSTEM privileges via the KiTrap0D exploit by Tavis Ormandy. If the session in use is already elevated then the exploit will not run. The module relies on kitrap0d.x86.dll, and is not supported on x64 editions of Windows.
You can test it on Hack the box "Devel": - OS Name: Microsoft Windows 7 Enterprise - OS Version: 6.1.7600 N/A Build 7600 - Hotfix(s): N/A
Tools
Windows Exploit Suggester
Local Exploit Suggester with MSF
Sherlock.ps1 > Find-AllVulns
PowerSploit > PowerUp.ps1> Invoke-AllChecks
Mimikaz
Last updated