From 24a05c7098812ed6ce46608ec0d0a3d17a610fa6 Mon Sep 17 00:00:00 2001 From: Dan Borges Date: Tue, 11 Jun 2019 11:51:09 -0700 Subject: [PATCH] Update Windows - Privilege Escalation.md --- Methodology and Resources/Windows - Privilege Escalation.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Methodology and Resources/Windows - Privilege Escalation.md b/Methodology and Resources/Windows - Privilege Escalation.md index bb4b6da..e4f97a5 100644 --- a/Methodology and Resources/Windows - Privilege Escalation.md +++ b/Methodology and Resources/Windows - Privilege Escalation.md @@ -665,7 +665,7 @@ python ms08-067.py 10.0.0.1 6 445 ### MS16-032 - Microsoft Windows 7 < 10 / 2008 < 2012 R2 (x86/x64) -Check if the patch is installed : `wmic qfe list | find "3139914"` +Check if the patch is installed : `wmic qfe list | findstr "3139914"` ```powershell Powershell: @@ -733,4 +733,4 @@ python2 send_and_execute.py 10.0.0.1 revshell.exe * [Pentestlab.blog - WPE-11 - Secondary Logon Handle](https://pentestlab.blog/2017/04/07/secondary-logon-handle/) * [Pentestlab.blog - WPE-12 - Insecure Registry Permissions](https://pentestlab.blog/2017/03/31/insecure-registry-permissions/) * [Pentestlab.blog - WPE-13 - Intel SYSRET](https://pentestlab.blog/2017/06/14/intel-sysret/) -* [Alternative methods of becoming SYSTEM - 20th November 2017 - Adam Chester @_xpn_](https://blog.xpnsec.com/becoming-system/) \ No newline at end of file +* [Alternative methods of becoming SYSTEM - 20th November 2017 - Adam Chester @_xpn_](https://blog.xpnsec.com/becoming-system/)