This commit is contained in:
carlospolop 2023-05-29 16:41:54 +02:00
parent 56a193df60
commit d4ff43b604
4 changed files with 38 additions and 8 deletions

View File

@ -1,4 +1,5 @@
If you are going to suggest something, please remove the following template. If you are going to suggest something, please remove the following template.
If your issue is related with WinPEAS.ps1 please mention https://github.com/RandolphConley
#### Issue description #### Issue description

View File

@ -9,10 +9,12 @@ Check more **information about how to exploit** found misconfigurations in **[bo
## Quick Start ## Quick Start
Find the **latest versions of all the scripts and binaries in [the releases page](https://github.com/carlospolop/PEASS-ng/releases/latest)**. Find the **latest versions of all the scripts and binaries in [the releases page](https://github.com/carlospolop/PEASS-ng/releases/latest)**.
## WinPEAS .exe and .bat ## WinPEAS Flavours
- [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASbat) - [Link to WinPEAS C# .exe project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe) (.Net >= 4.5.2 required)
- [Link to WinPEAS C# project (.exe)](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe) (.Net >= 4.5.2 required)
- **Please, read the Readme of that folder to learn how to execute winpeas from memory or how make colors work among other tricks** - **Please, read the Readme of that folder to learn how to execute winpeas from memory or how make colors work among other tricks**
- [Link to WinPEAS .ps1 project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASps1)
- [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASbat)
## PEASS Style ## PEASS Style

26
winPEAS/winPEASps1/README.md Executable file
View File

@ -0,0 +1,26 @@
# Windows Privilege Escalation Awesome Script (.ps2)
![](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/raw/master/winPEAS/winPEASexe/images/winpeas.png)
**WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation)**
Check also the **Local Windows Privilege Escalation checklist** from **[book.hacktricks.xyz](https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation)**
## Mantainer
The official **maintainer of this script is [RandolphConley](https://github.com/RandolphConley)**.
## Quick Start
Download the **[latest releas from here](https://github.com/carlospolop/PEASS-ng/releases/latest)**.
```bash
powershell "IEX(New-Object Net.WebClient).downloadString('https://raw.githubusercontent.com/carlospolop/PEASS-ng/master/winPEAS/winPEASps1/WinPeas.ps1')"
```
## Advisory
All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.
By Polop

View File

@ -6,10 +6,11 @@
.EXAMPLE .EXAMPLE
.\WinPeas.ps1 .\WinPeas.ps1
.NOTES .NOTES
Version: 1.0 Version: 1.0
Author: @Carlospopm and @RandolphConley PEASS-ng Original Author: carlospolop
Creation Date: 10/4/2022 WinPEAS.ps1 Author: @RandolphConley
Website https://github.com/carlospolop/PEASS-ng Creation Date: 10/4/2022
Website: https://github.com/carlospolop/PEASS-ng
TESTED: PoSh 5,7 TESTED: PoSh 5,7
UNTESTED: Posh 3,4 UNTESTED: Posh 3,4
@ -140,7 +141,7 @@ Function Get-ClipBoardText {
(((((((((/, ,####################(/..((((((((((. (((((((((/, ,####################(/..((((((((((.
(((((((((/,. ,*//////*,. ./(((((((((((. (((((((((/,. ,*//////*,. ./(((((((((((.
(((((((((((((((((((((((((((/ (((((((((((((((((((((((((((/
by carlospolop by @RandolphConley & carlospolop
" "
######################## INTRODUCTION ######################## ######################## INTRODUCTION ########################
$stopwatch = [system.diagnostics.stopwatch]::StartNew() $stopwatch = [system.diagnostics.stopwatch]::StartNew()