Privilege escalation
One of the fun parts!
Windows
Windows versions
Clients
Windows OS Version Number
Windows 1.0 1.04
Windows 2.0 2.11
Windows 3.0 3
Windows NT 3.1 3.10.528
Windows for Workgroups 3.11 3.11
Windows NT Workstation 3.5 3.5.807
Windows NT Workstation 3.51 3.51.1057
Windows 95 4.0.950
Windows NT Workstation 4.0 4.0.1381
Windows 98 4.1.1998
Windows 98 Second Edition 4.1.2222
Windows Me 4.90.3000
Windows 2000 Professional 5.0.2195
Windows XP 5.1.2600
Windows Vista 6.0.6000
Windows 7 6.1.7600
Windows 8.1 6.3.9600
Windows 10 10.0.10240Servers
Users
Passwords
Password hashes
Search for passwords
Unquoted Service Path
AlwaysInstallElevated
upnp host
Scheduled tasks
PowerShell tools
PowerUp.ps1
Sherlock.ps1
Nishang
Cross compiling
Misc
Windows remote exploits
Windows local exploits
Precompiled exploits
Linux
Sudo
Distribution type & kernel version
Default writeable directory / folder
Search for passwords
Find possible other writeable directory / folder
Service(s) running as root user
Installed applications
Scheduled jobs
Search for juicy shizzle
Find pattern in file:
SSH
Host keys
Search for RSA private keys
Search for DSA private keys
Sticky bit, SGID, SUID, GUID
Example SUID exploitation
Add user to /etc/passwd and root group
Enumeration tools
Linux local exploits
Precompiled exploits
Last updated