Author Archives: Pentester

29 Dec

LinEnum.sh

#!/bin/bash #A script to enumerate local information from a Linux host v=”version 0.6″ #@rebootuser #help function usage () { echo -e “\n\e[00;31m#########################################################\e[00m” echo -e “\e[00;31m#\e[00m” “\e[00;33mLocal Linux Enumeration & Privilege Escalation Script\e[00m” “\e[00;31m#\e[00m” echo -e “\e[00;31m#########################################################\e[00m” echo -e “\e[00;33m# www.rebootuser.com | @rebootuser \e[00m” echo -e “\e[00;33m# $v\e[00m\n” echo -e “\e[00;33m# Example: ./LinEnum.sh -k keyword -r […]

read more »
29 Dec

MS11-080 AfdJoinLeaf Privilege Escalation

This module exploits a flaw in the AfdJoinLeaf function of the afd.sys driver to overwrite data in kernel space. An address within the HalDispatchTable is overwritten and when triggered with a call to NtQueryIntervalProfile will execute shellcode. This module will elevate itself to SYSTEM, then inject the payload into another SYSTEM process before restoring its […]

read more »
28 Dec

windows privilege escalation using “bypassuac vbs” metasploit

Hacking any windows system is an easy process with metasploit. We can use many techniques to compromise windows by either exploiting a remote code execution or malicious file attack. Code is often embedded with genuine applications or executed remotely on an application with limited privileges. When we use getsystem command it will return an error “access […]

read more »
Windows Privilege Escalation Methods for Pentesters
27 Dec

Windows Privilege Escalation Methods for Pentesters

Imagine that you have gotten a low-priv Meterpreter session on a Windows machine. Probably you’ll run getsystem to escalate your privileges. But what if it fails? Don’t panic. There are still some techniques you can try. Unquoted Service Paths Basically, it is a vulnerability that occurs if a service executable path is not enclosed with quotation marks […]

read more »
21 Dec

rpcclient – Help

Name rpcclient — tool for executing client side MS-RPC functions Synopsis rpcclient [-A authfile] [-c <command string>] [-d debuglevel] [-h] [-l logdir] [-N] [-s <smb config file>] [-U username[%password]] [-W workgroup] [-I destinationIP] {server} DESCRIPTION This tool is part of the samba(7) suite. rpcclient is a utility initially developed to test MS-RPC functionality in Samba itself. It has undergone […]

read more »
20 Dec

More with rpcclient

Got asked to help remotely locate local admins on boxes on a network. rpcclient $> enumalsgroups Usage: enumalsgroups builtin|domain [access mask] rpcclient $> enumalsgroups builtin group:[Administrators] rid:[0x220] group:[Backup Operators] rid:[0x227] group:[Guests] rid:[0x222] group:[Network Configuration Operators] rid:[0x22c] group:[Power Users] rid:[0x223] group:[Remote Desktop Users] rid:[0x22b] group:[Replicator] rid:[0x228] group:[Users] rid:[0x221] Now you would think that doing a querygroup […]

read more »
15 Dec

How to turn off gcc compiler optimization to enable buffer overflow

up vote55down votefavorite 35 I’m working on a homework problem that requires disabling compiler optimization protection for it to work. I’m using gcc 4.4.1 on ubuntu linux, but can’t figure out which flags are are the right ones. I realize it’s architecture dependant – my machine runs w/ 32-bit Intel processor. Thanks. c gcc buffer-overflow compiler-optimization 6 Answers activeoldestvotes up […]

read more »