Skip to content

accesschk

lethanhtung01011980 edited this page Oct 8, 2019 · 2 revisions

Notes

  • Already has a LOW PRIVILEGE user
  • Always put /accepteula at the end

References

Check for insecure services

  • accesschk users -cw * /accepteula
  • accesschk.exe -uwcqv "Authenticated Users" * /accepteula
  • accesschk users -cuwcqv * /accepteula
  • accesschk.exe -ucqv service name /accepteula

Find all weak folder permissions per drive.

  • accesschk.exe -uwdqs Users c:\ /accepteula
  • accesschk.exe -uwdqs "Authenticated Users" c:\ /accepteula

Find all weak file permissions per drive.

  • accesschk.exe -uwqs Users c:*.* /accepteula
  • accesschk.exe -uwqs "Authenticated Users" c:*.* /accepteula

To see what Registry keys under HKLM\CurrentUser a specific account has no access to:

  • accesschk -kns austin\mruss hklm\software /accepteula

To see the security on the HKLM\Software key:

  • accesschk -k hklm\software /accepteula

To see all files under \Users\Mark on Vista that have an explicit integrity level:

  • accesschk -e -s c:\users\mark /accepteula

To see all global objects that Everyone can modify:

  • accesschk -wuo everyone \basednamedobjects /accepteula

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally