18 lines
633 B
Markdown
18 lines
633 B
Markdown
|
|
|||
|
## Top Commands
|
|||
|
|
|||
|
Powershell
|
|||
|
```shell-session
|
|||
|
PS C:\> Set-ExecutionPolicy Bypass -Scope process -Force
|
|||
|
PS C:\> . .\PrivescCheck.ps1
|
|||
|
PS C:\> Invoke-PrivescCheck
|
|||
|
```
|
|||
|
|
|||
|
- Set-ExecutionPolicy... ---> bypass the execution policy restrictions. To achieve this, you can use the `Set-ExecutionPolicy` cmdlet as shown below.
|
|||
|
|
|||
|
https://github.com/itm4n/PrivescCheck
|
|||
|
|
|||
|
|
|||
|
## What is PrivescCheck
|
|||
|
|
|||
|
This script aims to enumerate common Windows configuration issues that can be leveraged for local privilege escalation. It also gathers various information that might be useful for exploitation and/or post-exploitation.
|