From 73f6ab940c3e70ae5ba949f8217f7c167958125a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Valent=C3=ADn=20Blanco?= Date: Wed, 10 Feb 2021 15:52:41 +0100 Subject: [PATCH] Update Windows - Privilege Escalation.md Adding WES-NG which is a great and updated replacement for Windows-Exploit-Suggester. --- .../Windows - Privilege Escalation.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/Methodology and Resources/Windows - Privilege Escalation.md b/Methodology and Resources/Windows - Privilege Escalation.md index ee63ab5..eea8995 100644 --- a/Methodology and Resources/Windows - Privilege Escalation.md +++ b/Methodology and Resources/Windows - Privilege Escalation.md @@ -87,6 +87,16 @@ powershell.exe -ExecutionPolicy Bypass -File .\jaws-enum.ps1 -OutputFilename JAWS-Enum.txt ``` - [winPEAS - Windows Privilege Escalation Awesome Script](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe) +- [Windows Exploit Suggester - Next Generation (WES-NG)](https://github.com/bitsadmin/wesng) + ```powershell + # First obtain systeminfo + systeminfo + systeminfo > systeminfo.txt + # Then feed it to wesng + python3 wes.py --update-wes + python3 wes.py --update + python3 wes.py systeminfo.txt + ``` ## Windows Version and Configuration