usbrubberducky-payloads/payloads/library/exfiltration/Priv-Paths
Darren Kitchen f60c67671e
Update payload.txt
fixed invalid DEFINE usageon line 22 to confirm with spec: https://docs.hak5.org/hak5-usb-rubber-ducky/attack-modes-constants-and-variables/constants#valid-usage
2022-12-16 13:04:22 -06:00
..
README.md Update README.md 2022-12-13 20:09:41 -05:00
payload.txt Update payload.txt 2022-12-16 13:04:22 -06:00

README.md

Table of Contents
  1. Description
  2. Getting Started
  3. Contributing
  4. Version History
  5. Contact
  6. Acknowledgments

Priv-Paths

Description

A payload to enumerate unqouted service paths for privilege escalation and send to a discord webhook.

Getting Started

Dependencies

  • Discord Webhook or other service that uses webhooks
  • Windows 10

(back to top)

Executing program

  • Plug in your device
  • Command will be entered in the command prompt to search for unqouted service paths so you can later exploit them for priv esc
wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" | findstr /i /v ^"^"^" > p.txt

(back to top)

Contributing

All contributors names will be listed here

atomiczsec

(back to top)

Version History

  • 0.1
    • Initial Release

(back to top)

Contact

📱 My Socials 📱

C#
YouTube
Python
Twitter
Jsonnet
I-Am-Jakoby's Discord

(back to top)

(back to top)

Acknowledgments

(back to top)