Checklist

  • Check current user

    • Check owned permissions for known exploits

      • Juicy Potato

    • Check read/write permissions on files and folders

      • SAM and SECURITY backup files

      • Service config files (Wordpress, rdp, htaccess...)

    • Check for owned services

    • Check groups

  • Check OS version and applied hotfixes for CVEs

  • Enumerate software

    • Applications with known exploits

    • Applications with global writable files/folders

      • DLL injection

    • Applications/services listening to localhost

    • Unquoted path exploit

  • Enumerate services with lax permissions

    • Enumerate with accesschk

      • Unquoted path exploit

      • Modify service configuration to execute arbitrary files/commands

  • Enumerate drivers for known exploits

  • Check registry configuration

    • Always install elevated

    • UAC bypass

    • Credentials stored in registry (Putty, SNMP, VNC...)

Last updated