Privileges Escalation
Once you have initial access, it is common that we need to expand our privileges. We distinct between horizontal and vertical escalation.
Last updated
Once you have initial access, it is common that we need to expand our privileges. We distinct between horizontal and vertical escalation.
Last updated
is a command-line tool used for Linux and Unix-based systems that can be used to monitor the activity of processes and other system events. Specifically, pspy64
can be used to track changes to the file system, network connections, and running processes, providing visibility into what is happening on a system in real-time.
One of the key benefits of pspy64
is that it does not require root privileges to run, which means that it can be used by non-privileged users to monitor activity on a system without needing to escalate privileges.
, short for "Linux Privilege Escalation Awesome Script," is a privilege escalation script specifically designed for Linux systems.
is a PowerShell script designed for Windows systems, particularly for identifying and exploiting privilege escalation vulnerabilities
is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege. Available for both Windows and Linux.
is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Metasploit has a module for this: exploit/windows/local/bypassuac_fodhelper
Always consult for possible exploits.