From 19e90fc841cf5c358dc89fabf6cf1eb18fd6911e Mon Sep 17 00:00:00 2001 From: AlessandroZ Date: Fri, 16 Nov 2018 17:25:34 +0100 Subject: [PATCH] Updated Post Exploitation (markdown) --- Post-Exploitation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Post-Exploitation.md b/Post-Exploitation.md index 5735d44..1a738f5 100644 --- a/Post-Exploitation.md +++ b/Post-Exploitation.md @@ -14,7 +14,7 @@ Depending on the system and context, you should launch system command using one - `Beroot`: find ways to elevate our privilege - from user to admin (windows/linux), check the [github](https://github.com/AlessandroZ/BeRoot) for more information. - `privesc_checker`: find well knows vulnerabilities on non up to date systems (windows/linux). [linux-exploit-suggester](https://github.com/mzet-/linux-exploit-suggester) is used on linux and [windows-exploit-suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) on windows. - `sudo_alias`: basic sudo alias (linux). -- `bypassuac`: bypass uac when possible - admin privilege required (windows). +- `bypassuac`: bypass uac when possible - admin privilege required (windows). Check [WinPwnage](https://github.com/rootm0s/WinPwnage) github for more information. - `getsystem`: once uac bypassed, get system privilege (windows). ## Credentials