mirror of
https://github.com/carlospolop/PEASS-ng
synced 2025-02-17 21:41:25 +01:00
PEASS
This commit is contained in:
parent
f19d4d9311
commit
dc4610c093
LICENSEREADME.md
checks
linPEAS
winPEAS
README.md
winPEASbat
winPEASexe
.vs/winPEAS/v16
README.mdimages
packages
Colorful.Console.1.2.9
Costura.Fody.4.1.0
CredentialManagement.1.0.2
Fody.6.0.0
.signature.p7sFody.6.0.0.nupkg
build
netclassictask
Fody.dllFodyCommon.dllFodyHelpers.dllFodyIsolated.dllMono.Cecil.Pdb.dllMono.Cecil.Pdb.pdbMono.Cecil.Rocks.dllMono.Cecil.Rocks.pdbMono.Cecil.dllMono.Cecil.pdb
netstandardtask
TaskScheduler.2.8.16
.signature.p7sTaskScheduler.2.8.16.nupkg
lib
net20
net35
net40
net452
netstandard2.0
141
README.md
Normal file → Executable file
141
README.md
Normal file → Executable file
File diff suppressed because one or more lines are too long
104
checks/README.md
104
checks/README.md
@ -1,104 +0,0 @@
|
||||
# LinPEAS - Linux Privilege Escalation Awsome Script (with colors!!)
|
||||
|
||||
Also valid for **Unix systems**
|
||||
|
||||
## What does linpeas look for
|
||||
- **System Information**
|
||||
- [x] SO & kernel version
|
||||
- [x] Sudo version
|
||||
- [x] PATH
|
||||
- [x] Date
|
||||
- [x] System stats
|
||||
- [x] Environment vars
|
||||
- [x] SElinux
|
||||
- [x] Printers
|
||||
- [x] Dmesg (signature verifications)
|
||||
- [x] Container?
|
||||
|
||||
- **Devices**
|
||||
- [x] sd* in /dev
|
||||
- [x] Unmounted filesystems
|
||||
|
||||
- **Available Software**
|
||||
- [x] Useful software
|
||||
- [x] Installed compilers
|
||||
|
||||
- **Processes & Cron & Services**
|
||||
- [x] Cleaned processes
|
||||
- [x] Binary processes permissions
|
||||
- [x] Different processes executed during 1 min
|
||||
- [x] Cron jobs
|
||||
- [x] Services
|
||||
|
||||
- **Network Information**
|
||||
- [x] Hostname, hosts & dns
|
||||
- [x] Content of /etc/inetd.conf
|
||||
- [x] Networks and neighbours
|
||||
- [x] Iptables rules
|
||||
- [x] Active ports
|
||||
- [x] Sniff permissions (tcpdump)
|
||||
|
||||
- **Users Information**
|
||||
- [x] Info about current user
|
||||
- [x] PGP keys
|
||||
- [x] `sudo -l` without password
|
||||
- [x] doas config file
|
||||
- [x] Pkexec policy
|
||||
- [x] Try to login using `su` as other users (using null pass and the username)
|
||||
- [x] List of superusers
|
||||
- [x] List of users with console
|
||||
- [x] Login info
|
||||
- [x] List of all users
|
||||
- [x] Clipboard and highlighted text
|
||||
|
||||
- **Software Information**
|
||||
- [x] MySQl (Version, user being configured, loging as "root:root","root:toor","root:", user hashes extraction via DB and file, possible backup user configured)
|
||||
- [x] PostgreSQL (Version, try login in "template0" and "template1" as: "postgres:", "psql:")
|
||||
- [x] Apache (Version)
|
||||
- [x] PHP cookies
|
||||
- [x] Wordpress (Database credentials)
|
||||
- [x] Tomcat (Credentials)
|
||||
- [x] Mongo (Version)
|
||||
- [x] Supervisor (Credentials)
|
||||
- [x] Cesi (Credentials)
|
||||
- [x] Rsyncd (Credentials)
|
||||
- [x] Hostapd (Credentials)
|
||||
- [x] Wifi (Credentials)
|
||||
- [x] Anaconda-ks (Credentials)
|
||||
- [x] VNC (Credentials)
|
||||
- [x] LDAP database (Credentials)
|
||||
- [x] Open VPN files (Credentials)
|
||||
- [x] SSH (private keys, known_hosts, authorized_hosts, authorized_keys, main config parameters in sshd_config, certificates, agents)
|
||||
- [X] PAM-SSH (Unexpected "auth" values)
|
||||
- [x] Cloud Credentials (credenals-AWS-, credentials.gb-GC-, legacy_credentials-GC-, access_tokens.db-GC-, accessTokens.json-Azure-, azureProfile.json-Azure-)
|
||||
- [x] NFS (privilege escalation misconfiguration)
|
||||
- [x] Kerberos (configuration & tickets in /tmp)
|
||||
- [x] Kibana (credentials)
|
||||
- [x] Logstash (Username and possible code execution)
|
||||
- [x] Elasticseach (Config info and Version via port 9200)
|
||||
- [x] Vault-ssh (Config values, secrets list and .vault-token files)
|
||||
- [x] screen and tmux sessions
|
||||
|
||||
|
||||
- **Generic Interesting Files**
|
||||
- [x] SUID & SGID files
|
||||
- [x] Capabilities
|
||||
- [x] .sh scripts in PATH
|
||||
- [x] Hashes (passwd, shadow & master.passwd)
|
||||
- [x] Try to read root dir
|
||||
- [x] Files owned by root inside /home
|
||||
- [x] List of readable files belonging to root and not world readable
|
||||
- [x] Root files inside a folder owned by the current user
|
||||
- [x] Reduced list of files inside my home and /home
|
||||
- [x] Mails
|
||||
- [x] Backup files
|
||||
- [x] DB files
|
||||
- [x] Web files
|
||||
- [x] Files that can contain passwords (and search for passwords inside *_history files)
|
||||
- [x] List of all hidden files
|
||||
- [x] List ALL writable files for current user (global, user and groups)
|
||||
- [x] Inside /tmp, /var/tmp and /var/backups
|
||||
- [x] Password ins config PHP files
|
||||
- [x] Get IPs, passwords and emails from logs
|
||||
- [x] password or credential files in home
|
||||
- [x] "pwd" and "passw" inside files (and get most probable lines)
|
243
linPEAS/README.md
Executable file
243
linPEAS/README.md
Executable file
File diff suppressed because one or more lines are too long
BIN
linPEAS/images/help.png
Executable file
BIN
linPEAS/images/help.png
Executable file
Binary file not shown.
After ![]() (image error) Size: 43 KiB |
BIN
linPEAS/images/network.png
Executable file
BIN
linPEAS/images/network.png
Executable file
Binary file not shown.
After ![]() (image error) Size: 10 KiB |
@ -203,8 +203,8 @@ HELP=$GREEN"Enumerate and search Privilege Escalation vectors.\n\
|
||||
$Y\t-s$B SuperFast (don't check 1min of processes and other time consuming checks bypassed)\n\
|
||||
$Y\t-n$B Do not export env variables related with history\n\
|
||||
$Y\t-d <IP/NETMASK>$B Discover hosts using fping or ping.$DG Ex: -d 192.168.0.1/24
|
||||
$Y\t-p <PORT(s)> -d <IP/NETMASK>$B Discover hosts looking for tcp open ports (via nc). By default ports 80,443,445,3389 will be checked but you have to add another one to indicate you want to discover using TCP (you can select 22 if you don't want to add more). You can also indicate a list of ports to add.$DG Ex: -d 192.168.0.1/24 -p 53,139
|
||||
$Y\t-i <IP> [-p <PORT(s)>]$B Scan an IP using nc. If you don't select ports top1000 of nmap will be scanned but if you wish, you can select a list of ports (and only those will be scanned).$DG Ex: -i 127.0.0.1 -p 53,80,443,8000,8080"
|
||||
$Y\t-p <PORT(s)> -d <IP/NETMASK>$B Discover hosts looking for TCP open ports (via nc). By default ports 80,443,445,3389 and another one indicated by you will be scanned (select 22 if you don't want to add more). You can also add a list of ports.$DG Ex: -d 192.168.0.1/24 -p 53,139
|
||||
$Y\t-i <IP> [-p <PORT(s)>]$B Scan an IP using nc. By default (no -p), top1000 of nmap will be scanned, but you can select a list of ports instead.$DG Ex: -i 127.0.0.1 -p 53,80,443,8000,8080"
|
||||
|
||||
while getopts "h?fsd:p:i:" opt; do
|
||||
case "$opt" in
|
||||
@ -414,7 +414,6 @@ echo "Green: Common things (users, groups, SUID/SGID, mounts, .sh scripts) " | s
|
||||
echo "LightMangenta: Your username" | sed "s,LightMangenta,${C}[1;95m&${C}[0m,"
|
||||
if [ "$(/usr/bin/id -u)" -eq "0" ]; then
|
||||
echo " YOU ARE ALREADY ROOT!!! (it could take longer to complete execution)" | sed "s,YOU ARE ALREADY ROOT!!!,${C}[1;31;103m&${C}[0m,"
|
||||
sleep 3 2>/dev/null
|
||||
fi
|
||||
echo ""
|
||||
echo ""
|
||||
@ -444,13 +443,8 @@ if [ "$SCAN_BAN_GOOD" ]; then
|
||||
else
|
||||
printf $RED"[-] $SCAN_BAN_BAD\n"$NC
|
||||
fi
|
||||
<<<<<<< HEAD
|
||||
if [ "`which nmap`" ];then
|
||||
NMAP_GOOD=$GREEN"nmap$B is available for network discover & port scanning, use it yourself"
|
||||
=======
|
||||
if [ "`which nmap 2>/dev/null`" ];then
|
||||
NMAP_GOOD=$GREEN"nmap$B is available for network discover & port scanning, you use use it yourself"
|
||||
>>>>>>> fc361b128caf52e0a3b243379cacfee3d358e45c
|
||||
printf $Y"[+] $NMAP_GOOD\n"$NC
|
||||
fi
|
||||
echo ""
|
13
winPEAS/README.md
Executable file
13
winPEAS/README.md
Executable file
@ -0,0 +1,13 @@
|
||||
# Windows Privilege Escalation Awsome Scripts
|
||||
|
||||
Check the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)
|
||||
|
||||
Check more **information about how to exploit** found misconfigurations in [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)
|
||||
|
||||
## WinPEAS .exe and .bat
|
||||
- [Link to WinPEAS C# project (.exe)](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/winpeas/winpeasexe)
|
||||
- [Link to WinPEAS .bat project](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/winpeas/winpeasbat) Notice that WinPEAS.bat is a batch script made for Windows systems which don't support WinPEAS.exe (Net.4 required)
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the [github issues](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/issues) and we will update the master version.
|
129
winPEAS/winPEASbat/README.md
Executable file
129
winPEAS/winPEASbat/README.md
Executable file
@ -0,0 +1,129 @@
|
||||
# Windows Privilege Escalation Awsome Script (.bat)
|
||||
|
||||
**WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)**
|
||||
|
||||
Check also the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)
|
||||
|
||||
### WinPEAS.bat is a batch script made for Windows systems which don't support WinPEAS.exe (Net.4 required)
|
||||
|
||||
Unfortunately this script **does not support colors** so you will need to know what are you looking for in each test and, also, you will have to know how to learn the icacls output, see below.
|
||||
|
||||
## Windows PE using CMD (.bat)
|
||||
|
||||
If you want to search for files and registry that could contain passwords, set to *yes* the *long* variable at the beginning of the script.
|
||||
|
||||
The script will use acceschk.exe if it is available (with that name). But it is not necessary, it also uses wmic + icacls.
|
||||
|
||||
Some of the tests in this script were extracted from **[here](https://github.com/enjoiz/Privesc/blob/master/privesc.bat)** and from **[here](https://github.com/codingo/OSCP-2/blob/master/Windows/WinPrivCheck.bat)**
|
||||
|
||||
|
||||
### Main checks
|
||||
|
||||
<details>
|
||||
<summary>Details</summary>
|
||||
|
||||
- [x] Systeminfo --SO version and patches-- (windows suggester)
|
||||
- [x] Common known exploits (2K, XP, 2K3, 2K8, Vista, 7)
|
||||
- [x] Audit Settings
|
||||
- [x] WEF Settings
|
||||
- [x] LAPS installed?
|
||||
- [x] UAC Settings
|
||||
- [x] AV?
|
||||
- [x] PS Settings
|
||||
- [x] Mounted disks
|
||||
- [x] SCCM installed?
|
||||
- [x] Remote Desktop Credentials Manager?
|
||||
- [x] WSUS Settings
|
||||
- [x] Processes list
|
||||
- [x] Interesting file permissions of binaries being executed
|
||||
- [x] Interesting file permissions of binaries run at startup
|
||||
- [x] AlwaysInstallElevated?
|
||||
- [x] Network info (see below)
|
||||
- [x] Users info (see below)
|
||||
- [x] Current user privileges
|
||||
- [x] Service binary permissions
|
||||
- [x] Check if permissions to modify any service registy
|
||||
- [x] Unquoted Service paths
|
||||
- [x] DLL Hijacking in PATH
|
||||
- [x] Windows Vault
|
||||
- [x] DPAPI Master Keys
|
||||
- [x] AppCmd.exe?
|
||||
- [x] Search for known registry to have passwords inside
|
||||
- [x] Search for known files to have passwords inside (can take some minutes)
|
||||
- [x] If *long*, search files with passwords inside
|
||||
- [x] If *long*, search registry with passwords inside
|
||||
|
||||
### More enumeration
|
||||
|
||||
- [x] Date & Time
|
||||
- [x] Env
|
||||
- [x] Installed Software
|
||||
- [x] Running Processes
|
||||
- [x] Current Shares
|
||||
- [x] Network Interfaces
|
||||
- [x] Used Ports
|
||||
- [x] Firewall
|
||||
- [x] ARP
|
||||
- [x] Routes
|
||||
- [x] Hosts
|
||||
- [x] Cached DNS
|
||||
- [x] Info about current user (PRIVILEGES)
|
||||
- [x] List groups (info about administrators)
|
||||
- [x] Current logon users
|
||||
|
||||
</details>
|
||||
|
||||
### Understanding icacls permissions
|
||||
|
||||
Icacls is the program used to check the rights that groups and users have in a file or folder.
|
||||
|
||||
Iclals is the main binary used here to check permissions.
|
||||
|
||||
Its output is not intuitive so if you are not familiar with the command, continue reading. Take into account that in XP you need administrators rights to use icacls (for this OS is very recommended to upload sysinternals accesschk.exe to enumerate rights).
|
||||
|
||||
**Interesting permissions**
|
||||
|
||||
```
|
||||
D - Delete access
|
||||
F - Full access (Edit_Permissions+Create+Delete+Read+Write)
|
||||
N - No access
|
||||
M - Modify access (Create+Delete+Read+Write)
|
||||
RX - Read and eXecute access
|
||||
R - Read-only access
|
||||
W - Write-only access
|
||||
```
|
||||
|
||||
We will focus in **F** (full), **M** (Modify access) and **W** (write).
|
||||
|
||||
**Use of Icacls by WinPEAS**
|
||||
|
||||
When checking rights of a file or a folder the script search for the strings: *(F)* or *(M)* or *(W)* and the string ":\" (so the path of the file being checked will appear inside the output).
|
||||
|
||||
It also checks that the found right (F, M or W) can be exploited by the current user.
|
||||
|
||||
A typical output where you dont have any nice access is:
|
||||
```
|
||||
C:\Windows\Explorer.EXE NT SERVICE\TrustedInstaller:(F)
|
||||
```
|
||||
|
||||
An output where you have some interesting privilege will be like:
|
||||
```
|
||||
C:\Users\john\Desktop\desktop.ini NT AUTHORITY\SYSTEM:(I)(F)
|
||||
MYDOMAIN\john:(I)(F)
|
||||
```
|
||||
|
||||
Here you can see that the privileges of user *NT AUTHORITY\SYSTEM* appears in the output because it is in the same line as the path of the binary. However, in the next line, you can see that our user (john) has full privileges in that file.
|
||||
|
||||
This is the kind of outpuf that you have to look for when usnig the winPEAS.bat script.
|
||||
|
||||
[More info about icacls here](https://ss64.com/nt/icacls.html)
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the [github issues](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/issues) and we will update the master version.
|
||||
|
||||
## License
|
||||
|
||||
MIT License
|
||||
|
||||
By Polop<sup>(TM)</sup>
|
383
winPEAS/winPEASbat/winPEAS.bat
Executable file
383
winPEAS/winPEASbat/winPEAS.bat
Executable file
@ -0,0 +1,383 @@
|
||||
@echo off
|
||||
|
||||
set long=no
|
||||
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [*] BASIC SYSTEM INFO ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] WINDOWS OS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Check for vulnerabilities for the OS version with the applied patches
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#kernel-exploits
|
||||
systeminfo
|
||||
echo.
|
||||
wmic qfe get Caption,Description,HotFixID,InstalledOn | more
|
||||
echo.
|
||||
echo.
|
||||
set expl=no
|
||||
for /f "tokens=3-9" %%a in ('systeminfo') do (echo "%%a %%b %%c %%d %%e %%f %%g" | findstr /i "2000 XP 2003 2008 vista" && set expl=yes) & (echo "%%a %%b %%c %%d %%e %%f %%g" | findstr /i /C:"windows 7" && set expl=yes)
|
||||
IF "%expl%" == "yes" echo [i] Possible exploits (https://github.com/codingo/OSCP-2/blob/master/Windows/WinPrivCheck.bat)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2592799" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS11-080 patch is NOT installed! (Vulns: XP/SP3,2K3/SP3-afd.sys)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB3143141" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS16-032 patch is NOT installed! (Vulns: 2K8/SP1/2,Vista/SP2,7/SP1-secondary logon)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2393802" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS11-011 patch is NOT installed! (Vulns: XP/SP2/3,2K3/SP2,2K8/SP2,Vista/SP1/2,7/SP0-WmiTraceMessageVa)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB982799" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS10-59 patch is NOT installed! (Vulns: 2K8,Vista,7/SP0-Chimichurri)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB979683" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS10-21 patch is NOT installed! (Vulns: 2K/SP4,XP/SP2/3,2K3/SP2,2K8/SP2,Vista/SP0/1/2,7/SP0-Win Kernel)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2305420" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS10-092 patch is NOT installed! (Vulns: 2K8/SP0/1/2,Vista/SP1/2,7/SP0-Task Sched)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB981957" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS10-073 patch is NOT installed! (Vulns: XP/SP2/3,2K3/SP2/2K8/SP2,Vista/SP1/2,7/SP0-Keyboard Layout)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB4013081" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS17-017 patch is NOT installed! (Vulns: 2K8/SP2,Vista/SP2,7/SP1-Registry Hive Loading)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB977165" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS10-015 patch is NOT installed! (Vulns: 2K,XP,2K3,2K8,Vista,7-User Mode to Ring)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB941693" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS08-025 patch is NOT installed! (Vulns: 2K/SP4,XP/SP2,2K3/SP1/2,2K8/SP0,Vista/SP0/1-win32k.sys)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB920958" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS06-049 patch is NOT installed! (Vulns: 2K/SP4-ZwQuerySysInfo)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB914389" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS06-030 patch is NOT installed! (Vulns: 2K,XP/SP2-Mrxsmb.sys)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB908523" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS05-055 patch is NOT installed! (Vulns: 2K/SP4-APC Data-Free)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB890859" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS05-018 patch is NOT installed! (Vulns: 2K/SP3/4,XP/SP1/2-CSRSS)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB842526" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS04-019 patch is NOT installed! (Vulns: 2K/SP2/3/4-Utility Manager)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB835732" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS04-011 patch is NOT installed! (Vulns: 2K/SP2/3/4,XP/SP0/1-LSASS service BoF)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB841872" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS04-020 patch is NOT installed! (Vulns: 2K/SP4-POSIX)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2975684" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS14-040 patch is NOT installed! (Vulns: 2K3/SP2,2K8/SP2,Vista/SP2,7/SP1-afd.sys Dangling Pointer)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB3136041" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS16-016 patch is NOT installed! (Vulns: 2K8/SP1/2,Vista/SP2,7/SP1-WebDAV to Address)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB3057191" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS15-051 patch is NOT installed! (Vulns: 2K3/SP2,2K8/SP2,Vista/SP2,7/SP1-win32k.sys)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2989935" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS14-070 patch is NOT installed! (Vulns: 2K3/SP2-TCP/IP)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2778930" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS13-005 patch is NOT installed! (Vulns: Vista,7,8,2008,2008R2,2012,RT-hwnd_broadcast)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2850851" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS13-053 patch is NOT installed! (Vulns: 7SP0/SP1_x86-schlamperei)
|
||||
IF "%expl%" == "yes" wmic qfe get Caption,Description,HotFixID,InstalledOn | findstr /C:"KB2870008" 1>NUL
|
||||
IF "%expl%" == "yes" IF errorlevel 1 echo MS13-081 patch is NOT installed! (Vulns: 7SP0/SP1_x86-track_popup_menu)
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] DATE and TIME ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] You may need to adjust your local date/time to exploit some vulnerability
|
||||
date /T
|
||||
time /T
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] Audit Settings ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Check what is being logged
|
||||
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] WEF Settings ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Check where are being sent the logs
|
||||
REG QUERY HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] LAPS installed? ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Check what is being logged
|
||||
REG QUERY "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft Services\AdmPwd" /v AdmPwdEnabled
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] UAC Settings ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] If the results read ENABLELUA REG_DWORD 0x1, part or all of the UAC components are on
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#basic-uac-bypass-full-file-system-access
|
||||
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUA
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] Registered Anti-Virus(AV) ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List | more
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] PS settings ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo PowerShell v2 Version:
|
||||
REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\1\PowerShellEngine /v PowerShellVersion
|
||||
echo PowerShell v5 Version:
|
||||
REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\3\PowerShellEngine /v PowerShellVersion
|
||||
echo Transcriptions Settings:
|
||||
REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription
|
||||
echo Module logging settings:
|
||||
REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging
|
||||
echo Scriptblog logging settings:
|
||||
REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] MOUNTED DISKS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Maybe you find something interesting
|
||||
(wmic logicaldisk get caption 2>nul | more) || (fsutil fsinfo drives 2>nul)
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] ENVIRONMENT ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Interesting information?
|
||||
set
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] INSTALLED SOFTWARE ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Some weird software? Check for vulnerabilities in unknow software installed
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#software
|
||||
dir /b "C:\Program Files" "C:\Program Files (x86)" | sort
|
||||
reg query HKEY_LOCAL_MACHINE\SOFTWARE
|
||||
IF exist C:\Windows\CCM\SCClient.exe echo SCCM is installed (installers are run with SYSTEM privileges, many are vulnerable to DLL Sideloading)
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] Remote Desktop Credentials Manager ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#remote-desktop-credential-manager
|
||||
IF exist "%AppLocal%\Local\Microsoft\Remote Desktop Connection Manager\RDCMan.settings" echo Found: RDCMan.settings in %AppLocal%\Local\Microsoft\Remote Desktop Connection Manager\RDCMan.settings, check for credentials in .rdg files
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] WSUS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] You can inject 'fake' updates into non-SSL WSUS traffic (WSUXploit)
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#wsus
|
||||
reg query HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\ 2>nul | findstr /i "wuserver" | findstr /i "http://"
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] RUNNING PROCESSES ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Something unexpected is running? Check for vulnerabilities
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#running-processes
|
||||
tasklist /SVC
|
||||
echo.
|
||||
echo [i] Checking file permissions of running processes (File backdooring - maybe the same files start automatically when Administrator logs in)
|
||||
for /f "tokens=2 delims='='" %%x in ('wmic process list full^|find /i "executablepath"^|find /i /v "system32"^|find ":"') do (
|
||||
for /f eol^=^"^ delims^=^" %%z in ('echo %%x') do (
|
||||
icacls "%%z" 2>nul | findstr /i "(F) (M) (W) :\\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo.
|
||||
)
|
||||
)
|
||||
echo.
|
||||
echo [i] Checking directory permissions of running processes (DLL injection)
|
||||
for /f "tokens=2 delims='='" %%x in ('wmic process list full^|find /i "executablepath"^|find /i /v "system32"^|find ":"') do for /f eol^=^"^ delims^=^" %%y in ('echo %%x') do (
|
||||
icacls "%%~dpy\" 2>nul | findstr /i "(F) (M) (W) :\\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo.
|
||||
)
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] RUN ^AT STARTUP ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Check if you can modify any binary that is going to be executed by admin or if you can impersonate a not found binary
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#run-at-startup
|
||||
::(autorunsc.exe -m -nobanner -a * -ct /accepteula 2>nul || wmic startup get caption,command 2>nul | more & ^
|
||||
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run 2>nul & ^
|
||||
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce 2>nul & ^
|
||||
reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run 2>nul & ^
|
||||
reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce 2>nul & ^
|
||||
icacls "C:\Documents and Settings\All Users\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
icacls "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
icacls "C:\Documents and Settings\%username%\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
icacls "C:\Documents and Settings\%username%\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
icacls "%programdata%\Microsoft\Windows\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
icacls "%programdata%\Microsoft\Windows\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
icacls "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
icacls "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\*" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. & ^
|
||||
schtasks /query /fo TABLE /nh | findstr /v /i "disable deshab informa")
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] AlwaysInstallElevated? ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] If '1' then you can install a .msi file with admin privileges ;)
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#alwaysinstallelevated
|
||||
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated 2> nul
|
||||
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated 2> nul
|
||||
echo.
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [*] NETWORK ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] CURRENT SHARES ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
net share
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] INTERFACES ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
ipconfig /all
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] USED PORTS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Check for services restricted from the outside
|
||||
netstat -ano | findstr /i listen
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] FIREWALL ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
netsh firewall show state
|
||||
netsh firewall show config
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] ^ARP ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
arp -A
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] ROUTES ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
route print
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] Hosts file ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
type C:\WINDOWS\System32\drivers\etc\hosts | findstr /v "^#"
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] CACHE DNS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
ipconfig /displaydns | findstr "Record" | findstr "Name Host"
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] WIFI ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] To get the clear-text password use: netsh wlan show profile <SSID> key=clear
|
||||
netsh wlan show profile
|
||||
echo.
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^>[*] BASIC USER INFO ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Check if you are inside the Administrators froup or if you have enabled any token that can be use to escalate privileges like SeImpersonatePrivilege, SeAssignPrimaryPrivilege, SeTcbPrivilege, SeBackupPrivilege, SeRestorePrivilege, SeCreateTokenPrivilege, SeLoadDriverPrivilege, SeTakeOwnershipPrivilege, SeDebbugPrivilege
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#users-and-groups
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] CURRENT USER ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
net user %username%
|
||||
net user %USERNAME% /domain 2>nul
|
||||
whoami /all
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] USERS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
net user
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] GROUPS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
net localgroup
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] ADMINISTRATORS GROUPS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
net localgroup Administrators 2>nul
|
||||
net localgroup Administradores 2>nul
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] CURRENT LOGGED USERS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
quser
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] CURRENT CLIPBOARD ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Any password inside the clipboard?
|
||||
powershell -command "Get-Clipboard" 2>nul
|
||||
echo.
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [*] SERVICES VULNERABILITIES ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
::echo.
|
||||
::echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] SERVICE PERMISSIONS WITH accesschk.exe FOR 'Authenticated users', Everyone, BUILTIN\Users, Todos and CURRENT USER ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
::echo [i] If Authenticated Users have SERVICE_ALL_ACCESS or SERVICE_CHANGE_CONFIG or WRITE_DAC or WRITE_OWNER or GENERIC_WRITE or GENERIC_ALL, you can modify the binary that is going to be executed by the service and start/stop the service
|
||||
::echo [i] If accesschk.exe is not in PATH, nothing will be found here
|
||||
::echo [I] AUTHETICATED USERS
|
||||
::accesschk.exe -uwcqv "Authenticated Users" * /accepteula 2>nul
|
||||
::echo [I] EVERYONE
|
||||
::accesschk.exe -uwcqv "Everyone" * /accepteula 2>nul
|
||||
::echo [I] BUILTIN\Users
|
||||
::accesschk.exe -uwcqv "BUILTIN\Users" * /accepteula 2>nul
|
||||
::echo [I] TODOS
|
||||
::accesschk.exe -uwcqv "Todos" * /accepteula 2>nul
|
||||
::echo [I] %USERNAME%
|
||||
::accesschk.exe -uwcqv %username% * /accepteula 2>nul
|
||||
::echo.
|
||||
::echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] SERVICE PERMISSIONS WITH accesschk.exe FOR * ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
::echo [i] Check for weird service permissions for unexpected groups"
|
||||
::accesschk.exe -uwcqv * /accepteula 2>nul
|
||||
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] SERVICE BINARY PERMISSIONS WITH WMIC + ICACLS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#services
|
||||
for /f "tokens=2 delims='='" %%a in ('cmd.exe /c wmic service list full ^| findstr /i "pathname" ^|findstr /i /v "system32"') do (
|
||||
for /f eol^=^"^ delims^=^" %%b in ("%%a") do icacls "%%b" 2>nul | findstr /i "(F) (M) (W) :\\" | findstr /i ":\\ everyone authenticated users todos usuarios %username%" && echo.
|
||||
)
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] CHECK IF YOU CAN MODIFY ANY SERVICE REGISTRY ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#services
|
||||
for /f %%a in ('reg query hklm\system\currentcontrolset\services') do del %temp%\reg.hiv >nul 2>&1 & reg save %%a %temp%\reg.hiv >nul 2>&1 && reg restore %%a %temp%\reg.hiv >nul 2>&1 && echo You can modify %%a
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] UNQUOTED SERVICE PATHS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] When the path is not quoted (ex: C:\Program files\soft\new folder\exec.exe) Windows will try to execute first 'C:\Progam.exe', then 'C:\Program Files\soft\new.exe' and finally 'C:\Program Files\soft\new folder\exec.exe'. Try to create 'C:\Program Files\soft\new.exe'
|
||||
echo [i] The permissions are also checked and filtered using icacls
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#services
|
||||
for /f "tokens=2" %%n in ('sc query state^= all^| findstr SERVICE_NAME') do (
|
||||
for /f "delims=: tokens=1*" %%r in ('sc qc "%%~n" ^| findstr BINARY_PATH_NAME ^| findstr /i /v /l /c:"c:\windows\system32" ^| findstr /v /c:""""') do (
|
||||
echo %%~s | findstr /r /c:"[a-Z][ ][a-Z]" >nul 2>&1 && (echo %%n && echo %%~s && icacls %%s | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%") && echo.
|
||||
)
|
||||
)
|
||||
::wmic service get name,displayname,pathname,startmode | more | findstr /i /v "C:\\Windows\\system32\\" | findstr /i /v """
|
||||
echo.
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [*] DLL HIJACKING in PATHenv variable ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Maybe you can take advantage of modifying/creating some binary in some of the following locations
|
||||
echo [i] PATH variable entries permissions - place binary or DLL to execute instead of legitimate
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#dll-hijacking
|
||||
for %%A in ("%path:;=";"%") do ( cmd.exe /c icacls "%%~A" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && echo. )
|
||||
echo.
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [*] CREDENTIALS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] WINDOWS VAULT ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#windows-vault
|
||||
cmdkey /list
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] DPAPI MASTER KEYS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Use the Mimikatz 'dpapi::masterkey' module with appropriate arguments (/rpc) to decrypt
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#dpapi
|
||||
powershell -command "Get-ChildItem %appdata%\Microsoft\Protect" 2>nul
|
||||
powershell -command "Get-ChildItem %localappdata%\Microsoft\Protect" 2>nul
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] DPAPI MASTER KEYS ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Use the Mimikatz 'dpapi::cred' module with appropriate /masterkey to decrypt
|
||||
echo [i] You can also extract many DPAPI masterkeys from memory with the Mimikatz 'sekurlsa::dpapi' module
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#dpapi
|
||||
echo Looking inside %appdata%\Microsoft\Credentials\
|
||||
dir /b/a %appdata%\Microsoft\Credentials\ 2>nul
|
||||
echo Looking inside %localappdata%\Microsoft\Credentials\
|
||||
dir /b/a %localappdata%\Microsoft\Credentials\ 2>nul
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] AppCmd ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#appcmd-exe
|
||||
IF EXIST %systemroot%\system32\inetsrv\appcmd.exe ECHO %systemroot%\system32\inetsrv\appcmd.exe exists.
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] Files an registry that may contain credentials ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
echo [i] Searching specific files that may contains credentias.
|
||||
echo [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#credentials-inside-files
|
||||
reg query HKCU\Software\ORL\WinVNC3\Password 2>nul
|
||||
reg query HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4 /v password 2>nul
|
||||
reg query HKLM\SYSTEM\Microsoft\Windows NT\Currentversion\WinLogon 2>nul
|
||||
reg query HKLM\SYSTEM\CurrentControlSet\Services\SNMP /s 2>nul
|
||||
reg query HKCU\Software\TightVNC\Server 2>nul
|
||||
reg query HKCU\Software\SimonTatham\PuTTY\Sessions /s 2>nul
|
||||
cd %USERPROFILE% 2>nul && dir /s/b *password* == *credential* 2>nul
|
||||
cd ..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..
|
||||
dir /s/b /A:-D RDCMan.settings == *.rdg == SCClient.exe == *_history == .sudo_as_admin_successful == .profile == *bashrc == httpd.conf == *.plan == .htpasswd == .git-credentials == *.rhosts == hosts.equiv == Dockerfile == docker-compose.yml == appcmd.exe == TypedURLs == TypedURLsTime == History == Bookmarks == Cookies == "Login Data" == places.sqlite == key3.db == key4.db == credentials == credentials.db == access_tokens.db == accessTokens.json == legacy_credentials == azureProfile.json == unattend.txt == access.log == error.log == *.gpg == *.pgp == *config*.php == elasticsearch.y*ml == kibana.y*ml == *.p12 == *.der == *.csr == *.cer == known_hosts == id_rsa == id_dsa == *.ovpn == anaconda-ks.cfg == hostapd.conf == rsyncd.conf == cesi.conf == supervisord.conf == tomcat-users.xml == *.kdbx == KeePass.config == Ntds.dit == SAM == SYSTEM == FreeSSHDservice.ini == sysprep.inf == sysprep.xml == unattend.xml == unattended.xml == *vnc*.ini == *vnc*.c*nf* == *vnc*.txt == *vnc*.xml == groups.xml == services.xml == scheduledtasks.xml == printers.xml == drives.xml == datasources.xml == php.ini == https.conf == https-xampp.conf == httpd.conf == my.ini == my.cnf == access.log == error.log == server.xml == SiteList.xml == ConsoleHost_history.txt == setupinfo == setupinfo.bak 2>nul | findstr /v ".dll"
|
||||
cd inetpub 2>nul && (dir /s/b web.config == *.log & cd ..)
|
||||
echo.
|
||||
echo.
|
||||
if "%long%" == "yes" (
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] REGISTRY WITH STRING pass OR pwd ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
reg query HKLM /f passw /t REG_SZ /s
|
||||
reg query HKCU /f passw /t REG_SZ /s
|
||||
reg query HKLM /f pwd /t REG_SZ /s
|
||||
reg query HKCU /f pwd /t REG_SZ /s
|
||||
echo.
|
||||
echo.
|
||||
echo [i] Iterating through the drives
|
||||
echo.
|
||||
for /f %%x in ('wmic logicaldisk get name^| more') do (
|
||||
set tdrive=%%x
|
||||
if "!tdrive:~1,2!" == ":" (
|
||||
%%x
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] FILES THAT CONTAINS THE WORD PASSWORD WITH EXTENSION: .xml .ini .txt *.cfg *.config ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
findstr /s/n/m/i password *.xml *.ini *.txt *.cfg *.config 2>nul | findstr /v /i "\\AppData\\Local \\WinSxS ApnDatabase.xml \\UEV\\InboxTemplates \\Microsoft.Windows.Cloud \\Notepad\+\+\\ vmware cortana alphabet \\7-zip\\" 2>nul
|
||||
echo.
|
||||
echo.
|
||||
echo _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-^> [+] FILES WHOSE NAME CONTAINS THE WORD PASS CRED or .config not inside \Windows\ ^<_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
||||
dir /s/b *pass* == *cred* == *.config* == *.cfg 2>nul | findstr /v /i "\\windows\\"
|
||||
echo.
|
||||
echo.
|
||||
)
|
||||
)
|
||||
echo.
|
||||
)
|
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/.suo
Executable file
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/.suo
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide
Executable file
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide-shm
Executable file
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide-shm
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide-wal
Executable file
BIN
winPEAS/winPEASexe/.vs/winPEAS/v16/Server/sqlite3/storage.ide-wal
Executable file
Binary file not shown.
147
winPEAS/winPEASexe/README.md
Executable file
147
winPEAS/winPEASexe/README.md
Executable file
@ -0,0 +1,147 @@
|
||||
# Windows Privilege Escalation Awsome Script (.exe)
|
||||
|
||||
**WinPEAS is a script that searh for possible paths to escalate privileges on Windows hosts. The checks are explained on [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation)**
|
||||
|
||||
Check also the **Local Windows Privilege Escalation checklist** from [book.hacktricks.xyz](https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation)
|
||||
|
||||
## Quick Start
|
||||
|
||||
Download the **[latest version from here](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/winpeas/winpeasexe/winpeas/bin/Release)** or **compile it yourself**.
|
||||
```bash
|
||||
winpeas.exe ansii #ANSII color for linux consoles (reverse shell)
|
||||
winpeas.exe #Will execute all checks except the ones that execute MD commands
|
||||
winpeas.exe cmd #All checks
|
||||
winpeas.exe cmd fast #All except the one that search for files
|
||||
winpeas.exe systeminfo userinfo #Only systeminfo and userinfo checks executed
|
||||
```
|
||||
|
||||
## Basic information
|
||||
|
||||
The goal of this project is to search for possible **Privilege Escalation Paths** in Windows environments.
|
||||
|
||||
It should take only a **few seconds** to execute almost all the checks and **some minutes searching in the whole main drive** for known files that could contain passwords (the time depened on the number of files in your drive). Get rif of that time consuming check using the parameter `fast`.
|
||||
|
||||
The **ouput will be colored**. Below you have some indications about what does each color means exacty, but keep in mind that **Red** is for something interesting (from a pentester perspective) and **Green** is something good (from a defender perspective).
|
||||
|
||||
The tool is heavily based in **[SeatBelt](https://github.com/GhostPack/Seatbelt)**.
|
||||
|
||||
**IMPORTANT TO NOTICE:** By default WinPEAS will use colord for Windows terminals (without ANSII characters). If execute winpeas.exe from a reverse shell without any option **no color will be printed**. To see color in a linux terminal you need to use the **ansii** parameter.
|
||||
|
||||
## Help
|
||||
|
||||

|
||||
|
||||
## Colors
|
||||
|
||||
<details>
|
||||
<summary>Details</summary>
|
||||

|
||||
|
||||
</details>
|
||||
|
||||
## Checks
|
||||
|
||||
<details>
|
||||
<summary>Details</summary>
|
||||
|
||||
- **System Information**
|
||||
- [x] Basic System info information
|
||||
- [x] Use Watson to search for vulnerabilities
|
||||
- [x] PS, Audit, WEF and LAPS Settings
|
||||
- [x] Environment Variables
|
||||
- [x] Internet Settings
|
||||
- [x] Current drives information
|
||||
- [x] AV?
|
||||
- [x] UAC configuration
|
||||
|
||||
- **Users Information**
|
||||
- [x] Users information
|
||||
- [x] Current token privileges
|
||||
- [x] Clipboard text
|
||||
- [x] Current logged users
|
||||
- [x] RDP sessions
|
||||
- [x] Ever logged users
|
||||
- [x] Autologin credentials
|
||||
- [x] Home folders
|
||||
- [x] Password policies
|
||||
|
||||
- **Processes Information**
|
||||
- [x] Interesting processes (non Microsoft)
|
||||
|
||||
- **Services Information**
|
||||
- [x] Interesting services (non Microsoft) information
|
||||
- [x] Writable service registry
|
||||
- [x] PATH Dll Hijacking
|
||||
|
||||
- **Applications Information**
|
||||
- [x] Current Active Window
|
||||
- [x] Installed software
|
||||
- [x] AutoRuns
|
||||
- [x] Scheduled tasks
|
||||
|
||||
- **Network Information**
|
||||
- [x] Current net shares
|
||||
- [x] hosts file
|
||||
- [x] Network Interfaces
|
||||
- [x] Listening ports
|
||||
- [x] Firewall rules
|
||||
- [x] DNS Cache (limit 70)
|
||||
|
||||
- **Windows Credentials**
|
||||
- [x] Windows Vault
|
||||
- [x] Credential Manager
|
||||
- [x] Saved RDO connections
|
||||
- [x] Recently run commands
|
||||
- [x] DPAPI Masterkeys
|
||||
- [x] DPAPI Credential files
|
||||
- [x] Remote Desktop Connection Manager credentials
|
||||
- [x] Kerberos Tickets
|
||||
- [x] Wifi
|
||||
- [x] AppCmd.exe
|
||||
- [x] SSClient.exe
|
||||
- [x] AlwaysInstallElevated
|
||||
- [x] WSUS
|
||||
|
||||
- **Browser Information**
|
||||
- [x] Firefox DBs
|
||||
- [x] Credentials in firefox history
|
||||
- [x] Chrome DBs
|
||||
- [x] Credentials in chrome history
|
||||
- [x] Current IE tabs
|
||||
- [x] Credentials in IE history
|
||||
- [x] IE Favorites
|
||||
|
||||
- **Interesting Files and registry**
|
||||
- [x] Putty sessions
|
||||
- [x] Putty SSH host keys
|
||||
- [x] Cloud credentials
|
||||
- [x] Possible registries with credentials
|
||||
- [x] Possible credentials files in users homes
|
||||
- [x] Possible password files inside the Recycle bin
|
||||
- [x] Possible files containing credentials (this take some minutes)
|
||||
- [x] User documents (limit 100)
|
||||
|
||||
</details>
|
||||
|
||||
## Do not fork it!!
|
||||
|
||||
If you want to **add something** and have **any cool idea** related to this project, please let me know it using the [github issues](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/issues) and we will update the master version.
|
||||
|
||||
## TODO
|
||||
|
||||
- Add more checks
|
||||
- Mantain updated Watson
|
||||
- List wifi networks without using CMD
|
||||
- List credentials inside the Credential Manager without using CMD
|
||||
|
||||
If you want to help with any of this, you can do it using [github issues](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/issues) or you can submit a pull request.
|
||||
|
||||
If you find any issue, please report it using [github issues](https://github.com/carlospolop/privilege-escalation-awsome-scripts-suite/issues).
|
||||
|
||||
**WinPEAS** is being **updated** every time I find something that could be useful to escalate privileges.
|
||||
|
||||
## License
|
||||
|
||||
MIT License
|
||||
|
||||
By Polop<sup>(TM)</sup>
|
BIN
winPEAS/winPEASexe/images/colors.png
Executable file
BIN
winPEAS/winPEASexe/images/colors.png
Executable file
Binary file not shown.
After ![]() (image error) Size: 108 KiB |
BIN
winPEAS/winPEASexe/images/help.png
Executable file
BIN
winPEAS/winPEASexe/images/help.png
Executable file
Binary file not shown.
After ![]() (image error) Size: 159 KiB |
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/.signature.p7s
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/.signature.p7s
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/Colorful.Console.1.2.9.nupkg
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/Colorful.Console.1.2.9.nupkg
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net40/Colorful.Console.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net40/Colorful.Console.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net45/Colorful.Console.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net45/Colorful.Console.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net451/Colorful.Console.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net451/Colorful.Console.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net452/Colorful.Console.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net452/Colorful.Console.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net46/Colorful.Console.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net46/Colorful.Console.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net461/Colorful.Console.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/net461/Colorful.Console.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/netstandard2.0/Colorful.Console.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Colorful.Console.1.2.9/lib/netstandard2.0/Colorful.Console.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/.signature.p7s
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/.signature.p7s
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/Costura.Fody.4.1.0.nupkg
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/Costura.Fody.4.1.0.nupkg
vendored
Executable file
Binary file not shown.
5
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/build/Costura.Fody.props
vendored
Executable file
5
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/build/Costura.Fody.props
vendored
Executable file
@ -0,0 +1,5 @@
|
||||
<Project xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
|
||||
<ItemGroup>
|
||||
<WeaverFiles Include="$(MsBuildThisFileDirectory)..\weaver\$(MSBuildThisFileName).dll" />
|
||||
</ItemGroup>
|
||||
</Project>
|
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/lib/net40/Costura.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/lib/net40/Costura.dll
vendored
Executable file
Binary file not shown.
18
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/lib/net40/Costura.xml
vendored
Executable file
18
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/lib/net40/Costura.xml
vendored
Executable file
@ -0,0 +1,18 @@
|
||||
<?xml version="1.0"?>
|
||||
<doc>
|
||||
<assembly>
|
||||
<name>Costura</name>
|
||||
</assembly>
|
||||
<members>
|
||||
<member name="T:CosturaUtility">
|
||||
<summary>
|
||||
Contains methods for interacting with the Costura system.
|
||||
</summary>
|
||||
</member>
|
||||
<member name="M:CosturaUtility.Initialize">
|
||||
<summary>
|
||||
Call this to Initialize the Costura system.
|
||||
</summary>
|
||||
</member>
|
||||
</members>
|
||||
</doc>
|
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/weaver/Costura.Fody.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/weaver/Costura.Fody.dll
vendored
Executable file
Binary file not shown.
85
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/weaver/Costura.Fody.xcf
vendored
Executable file
85
winPEAS/winPEASexe/packages/Costura.Fody.4.1.0/weaver/Costura.Fody.xcf
vendored
Executable file
@ -0,0 +1,85 @@
|
||||
<?xml version="1.0" encoding="utf-8" ?>
|
||||
<xs:complexType xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:all>
|
||||
<xs:element minOccurs="0" maxOccurs="1" name="ExcludeAssemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of assembly names to exclude from the default action of "embed all Copy Local references", delimited with line breaks</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:element>
|
||||
<xs:element minOccurs="0" maxOccurs="1" name="IncludeAssemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of assembly names to include from the default action of "embed all Copy Local references", delimited with line breaks.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:element>
|
||||
<xs:element minOccurs="0" maxOccurs="1" name="Unmanaged32Assemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of unmanaged 32 bit assembly names to include, delimited with line breaks.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:element>
|
||||
<xs:element minOccurs="0" maxOccurs="1" name="Unmanaged64Assemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of unmanaged 64 bit assembly names to include, delimited with line breaks.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:element>
|
||||
<xs:element minOccurs="0" maxOccurs="1" name="PreloadOrder" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>The order of preloaded assemblies, delimited with line breaks.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:element>
|
||||
</xs:all>
|
||||
<xs:attribute name="CreateTemporaryAssemblies" type="xs:boolean">
|
||||
<xs:annotation>
|
||||
<xs:documentation>This will copy embedded files to disk before loading them into memory. This is helpful for some scenarios that expected an assembly to be loaded from a physical file.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="IncludeDebugSymbols" type="xs:boolean">
|
||||
<xs:annotation>
|
||||
<xs:documentation>Controls if .pdbs for reference assemblies are also embedded.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="DisableCompression" type="xs:boolean">
|
||||
<xs:annotation>
|
||||
<xs:documentation>Embedded assemblies are compressed by default, and uncompressed when they are loaded. You can turn compression off with this option.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="DisableCleanup" type="xs:boolean">
|
||||
<xs:annotation>
|
||||
<xs:documentation>As part of Costura, embedded assemblies are no longer included as part of the build. This cleanup can be turned off.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="LoadAtModuleInit" type="xs:boolean">
|
||||
<xs:annotation>
|
||||
<xs:documentation>Costura by default will load as part of the module initialization. This flag disables that behavior. Make sure you call CosturaUtility.Initialize() somewhere in your code.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="IgnoreSatelliteAssemblies" type="xs:boolean">
|
||||
<xs:annotation>
|
||||
<xs:documentation>Costura will by default use assemblies with a name like 'resources.dll' as a satellite resource and prepend the output path. This flag disables that behavior.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="ExcludeAssemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of assembly names to exclude from the default action of "embed all Copy Local references", delimited with |</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="IncludeAssemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of assembly names to include from the default action of "embed all Copy Local references", delimited with |.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="Unmanaged32Assemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of unmanaged 32 bit assembly names to include, delimited with |.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="Unmanaged64Assemblies" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>A list of unmanaged 64 bit assembly names to include, delimited with |.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
<xs:attribute name="PreloadOrder" type="xs:string">
|
||||
<xs:annotation>
|
||||
<xs:documentation>The order of preloaded assemblies, delimited with |.</xs:documentation>
|
||||
</xs:annotation>
|
||||
</xs:attribute>
|
||||
</xs:complexType>
|
BIN
winPEAS/winPEASexe/packages/CredentialManagement.1.0.2/.signature.p7s
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/CredentialManagement.1.0.2/.signature.p7s
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/CredentialManagement.1.0.2/CredentialManagement.1.0.2.nupkg
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/CredentialManagement.1.0.2/CredentialManagement.1.0.2.nupkg
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/CredentialManagement.1.0.2/lib/net35/CredentialManagement.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/CredentialManagement.1.0.2/lib/net35/CredentialManagement.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/.signature.p7s
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/.signature.p7s
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/Fody.6.0.0.nupkg
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/Fody.6.0.0.nupkg
vendored
Executable file
Binary file not shown.
110
winPEAS/winPEASexe/packages/Fody.6.0.0/build/Fody.targets
vendored
Executable file
110
winPEAS/winPEASexe/packages/Fody.6.0.0/build/Fody.targets
vendored
Executable file
@ -0,0 +1,110 @@
|
||||
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
|
||||
|
||||
<PropertyGroup>
|
||||
<ProjectWeaverXml Condition="$(ProjectWeaverXml) == ''">$(ProjectDir)FodyWeavers.xml</ProjectWeaverXml>
|
||||
<FodyPath Condition="$(FodyPath) == ''">$(MSBuildThisFileDirectory)..\</FodyPath>
|
||||
<FodyAssemblyDirectory Condition="$(MSBuildRuntimeType) == 'Core'">$(FodyPath)netstandardtask</FodyAssemblyDirectory>
|
||||
<FodyAssemblyDirectory Condition="$(MSBuildRuntimeType) != 'Core'">$(FodyPath)netclassictask</FodyAssemblyDirectory>
|
||||
<FodyAssembly Condition="$(FodyAssembly) == ''">$(FodyAssemblyDirectory)\Fody.dll</FodyAssembly>
|
||||
<DefaultItemExcludes>$(DefaultItemExcludes);FodyWeavers.xsd</DefaultItemExcludes>
|
||||
<FodyGenerateXsd Condition="$(FodyGenerateXsd) == ''">true</FodyGenerateXsd>
|
||||
<MsBuildMajorVersion>15</MsBuildMajorVersion>
|
||||
<MsBuildMajorVersion Condition="'$(MSBuildVersion)' != ''">$([System.Version]::Parse($(MSBuildVersion)).Major)</MsBuildMajorVersion>
|
||||
</PropertyGroup>
|
||||
|
||||
<ItemGroup Condition="Exists($(ProjectWeaverXml))">
|
||||
<UpToDateCheckInput Include="$(ProjectWeaverXml)" />
|
||||
<CustomAdditionalCompileInputs Include="$(ProjectWeaverXml)" />
|
||||
</ItemGroup>
|
||||
|
||||
<!-- Support for NCrunch -->
|
||||
<ItemGroup Condition="'$(NCrunch)' == '1' and '$(TargetFramework)' == '' and '$(TargetFrameworks)' == ''">
|
||||
<None Include="$(FodyAssemblyDirectory)\*.*" />
|
||||
<None Include="@(WeaverFiles)" />
|
||||
</ItemGroup>
|
||||
|
||||
<UsingTask TaskName="Fody.WeavingTask" AssemblyFile="$(FodyAssembly)" />
|
||||
<UsingTask TaskName="Fody.UpdateReferenceCopyLocalTask" AssemblyFile="$(FodyAssembly)" />
|
||||
<UsingTask TaskName="Fody.VerifyTask" AssemblyFile="$(FodyAssembly)" />
|
||||
|
||||
<Target
|
||||
Name="FodyTarget"
|
||||
AfterTargets="AfterCompile"
|
||||
Condition="Exists(@(IntermediateAssembly)) And $(DesignTimeBuild) != true And $(DisableFody) != true"
|
||||
DependsOnTargets="$(FodyDependsOnTargets)"
|
||||
Inputs="@(IntermediateAssembly);$(ProjectWeaverXml)"
|
||||
Outputs="$(IntermediateOutputPath)$(MSBuildProjectFile).Fody.CopyLocal.cache">
|
||||
|
||||
<Error Condition="($(MsBuildMajorVersion) < 16)"
|
||||
Text="Fody is only supported on MSBuild 16 and above. Current version: $(MsBuildMajorVersion)." />
|
||||
<Fody.WeavingTask
|
||||
AssemblyFile="@(IntermediateAssembly)"
|
||||
IntermediateDirectory="$(ProjectDir)$(IntermediateOutputPath)"
|
||||
KeyOriginatorFile="$(KeyOriginatorFile)"
|
||||
AssemblyOriginatorKeyFile="$(AssemblyOriginatorKeyFile)"
|
||||
ProjectDirectory="$(MSBuildProjectDirectory)"
|
||||
ProjectFile="$(MSBuildProjectFullPath)"
|
||||
SolutionDirectory="$(SolutionDir)"
|
||||
References="@(ReferencePath)"
|
||||
SignAssembly="$(SignAssembly)"
|
||||
ReferenceCopyLocalFiles="@(ReferenceCopyLocalPaths)"
|
||||
DefineConstants="$(DefineConstants)"
|
||||
DebugType="$(DebugType)"
|
||||
DocumentationFile="@(DocFileItem->'%(FullPath)')"
|
||||
WeaverFiles="@(WeaverFiles)"
|
||||
NCrunchOriginalSolutionDirectory="$(NCrunchOriginalSolutionDir)"
|
||||
IntermediateCopyLocalFilesCache="$(IntermediateOutputPath)$(MSBuildProjectFile).Fody.CopyLocal.cache"
|
||||
GenerateXsd="$(FodyGenerateXsd)"
|
||||
>
|
||||
|
||||
<Output
|
||||
TaskParameter="ExecutedWeavers"
|
||||
PropertyName="FodyExecutedWeavers" />
|
||||
|
||||
</Fody.WeavingTask>
|
||||
|
||||
<ItemGroup>
|
||||
<FileWrites Include="$(IntermediateOutputPath)$(MSBuildProjectFile).Fody.CopyLocal.cache" />
|
||||
</ItemGroup>
|
||||
|
||||
</Target>
|
||||
|
||||
<Target
|
||||
Name="FodyUpdateCopyLocalFilesTarget"
|
||||
AfterTargets="FodyTarget"
|
||||
>
|
||||
|
||||
<Fody.UpdateReferenceCopyLocalTask
|
||||
ReferenceCopyLocalFiles="@(ReferenceCopyLocalPaths)"
|
||||
IntermediateCopyLocalFilesCache="$(IntermediateOutputPath)$(MSBuildProjectFile).Fody.CopyLocal.cache"
|
||||
>
|
||||
|
||||
<Output
|
||||
TaskParameter="UpdatedReferenceCopyLocalFiles"
|
||||
ItemName="FodyUpdatedReferenceCopyLocalPaths" />
|
||||
|
||||
</Fody.UpdateReferenceCopyLocalTask>
|
||||
|
||||
<ItemGroup>
|
||||
<ReferenceCopyLocalPaths Remove="@(ReferenceCopyLocalPaths)" />
|
||||
<ReferenceCopyLocalPaths Include="@(FodyUpdatedReferenceCopyLocalPaths)" />
|
||||
</ItemGroup>
|
||||
|
||||
</Target>
|
||||
|
||||
<Target
|
||||
Name="FodyVerifyTarget"
|
||||
AfterTargets="AfterBuild"
|
||||
Condition="'$(NCrunch)' != '1' And $(FodyExecutedWeavers) != '' And $(DisableFody) != true"
|
||||
DependsOnTargets="$(FodyVerifyDependsOnTargets)">
|
||||
|
||||
<Fody.VerifyTask
|
||||
ProjectDirectory="$(MSBuildProjectDirectory)"
|
||||
TargetPath="$(TargetPath)"
|
||||
SolutionDirectory="$(SolutionDir)"
|
||||
DefineConstants="$(DefineConstants)"
|
||||
NCrunchOriginalSolutionDirectory="$(NCrunchOriginalSolutionDir)"
|
||||
/>
|
||||
</Target>
|
||||
|
||||
</Project>
|
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Fody.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Fody.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/FodyCommon.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/FodyCommon.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/FodyHelpers.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/FodyHelpers.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/FodyIsolated.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/FodyIsolated.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Pdb.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Pdb.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Pdb.pdb
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Pdb.pdb
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Rocks.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Rocks.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Rocks.pdb
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.Rocks.pdb
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.pdb
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netclassictask/Mono.Cecil.pdb
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Fody.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Fody.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/FodyCommon.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/FodyCommon.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/FodyHelpers.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/FodyHelpers.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/FodyIsolated.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/FodyIsolated.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Pdb.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Pdb.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Pdb.pdb
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Pdb.pdb
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Rocks.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Rocks.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Rocks.pdb
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.Rocks.pdb
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.pdb
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/Fody.6.0.0/netstandardtask/Mono.Cecil.pdb
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/.signature.p7s
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/.signature.p7s
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/TaskScheduler.2.8.16.nupkg
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/TaskScheduler.2.8.16.nupkg
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
Binary file not shown.
8999
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
8999
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
File diff suppressed because it is too large
Load Diff
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net20/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
Binary file not shown.
7922
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
7922
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
File diff suppressed because it is too large
Load Diff
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net35/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
Binary file not shown.
7584
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
7584
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
File diff suppressed because it is too large
Load Diff
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net40/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
Binary file not shown.
7718
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
7718
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
File diff suppressed because it is too large
Load Diff
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/es/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/fr/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/it/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/pl/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/ru/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/net452/zh-CN/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/netstandard2.0/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/netstandard2.0/Microsoft.Win32.TaskScheduler.dll
vendored
Executable file
Binary file not shown.
8619
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/netstandard2.0/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
8619
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/netstandard2.0/Microsoft.Win32.TaskScheduler.xml
vendored
Executable file
File diff suppressed because it is too large
Load Diff
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/netstandard2.0/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
BIN
winPEAS/winPEASexe/packages/TaskScheduler.2.8.16/lib/netstandard2.0/de/Microsoft.Win32.TaskScheduler.resources.dll
vendored
Executable file
Binary file not shown.
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user