System Details
The following commands can be used for enumerating various information about the Operating System that can in turn be used for further exploiting or elevating privileges.
Hostname
The following command can provide info on whether the system is a webserver, database or a domain controller,
hostnameOperating System Version & Architecture
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"Firewall Status and Rules
netsh advfirewall show currentprofile
netsh advfirewall firewall show rule name=allNetwork Details
Its important to note the different NICs, their IP addresses and the various network settings that are configured into the system,
Binaries that Autoelevate
There is a registry setting "AlwaysInstalleElevated" which can allow the current user to run Windows installer packages with elevated privileges. In order to exploit this vulnerability, the HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE should have this key enabled.
if the setting is enabled, then an MSI can be designed and run to elevate our privileges.
Last updated