Metasploit mailing list archives

Re: Privilege escalation on an isolated system


From: Enis Sahin <enis.c.sahin () gmail com>
Date: Thu, 1 Dec 2011 00:22:12 +0200

I think it sounds either like he is in the army (mandatory service
etc.) and trying to get unrestricted access to the army computers to
install some games or he is trying to get unlimited access to his
corporate laptop so that he can use it freely.

Don't mean to point fingers but how else do you get an isolated system
involved in your project scope?

Enis


On 30 November 2011 23:00, Tim Brown <tmb () 65535 com> wrote:
On Monday 28 Nov 2011 00:57:44 Lukas Kuzmiak wrote:
just came across this tool from pentestmonkey, seems to be very nice.

http://code.google.com/p/windows-privesc-check/


I don't often post here, but since it's come up, you all might well like wpc's
older brother unix-privesc-check also written by pentestmonkey (and which I've
kinda inherited).  I'm working on v2 of the latter at the moment.  Neither are
perfect but they do offer some quick wins on penetration tests.

Tim
--
Tim Brown
<mailto:tmb () 65535 com>

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




-- 
http://www.enissahin.com | http://twitter.com/enis_sahin
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: