diff --git a/Post-Exploitation.md b/Post-Exploitation.md index 5735d44..1a738f5 100644 --- a/Post-Exploitation.md +++ b/Post-Exploitation.md @@ -14,7 +14,7 @@ Depending on the system and context, you should launch system command using one - `Beroot`: find ways to elevate our privilege - from user to admin (windows/linux), check the [github](https://github.com/AlessandroZ/BeRoot) for more information. - `privesc_checker`: find well knows vulnerabilities on non up to date systems (windows/linux). [linux-exploit-suggester](https://github.com/mzet-/linux-exploit-suggester) is used on linux and [windows-exploit-suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) on windows. - `sudo_alias`: basic sudo alias (linux). -- `bypassuac`: bypass uac when possible - admin privilege required (windows). +- `bypassuac`: bypass uac when possible - admin privilege required (windows). Check [WinPwnage](https://github.com/rootm0s/WinPwnage) github for more information. - `getsystem`: once uac bypassed, get system privilege (windows). ## Credentials