Metasploit mailing list archives

Re: Privilege escalation on an isolated system


From: Brahim Sakka <brahim.sakka () gmail com>
Date: Thu, 1 Dec 2011 23:21:25 +0100

2011/11/30, Enis Sahin <enis.c.sahin () gmail com>:
I think it sounds either like he is in the army (mandatory service
etc.) and trying to get unrestricted access to the army computers to
install some games or he is trying to get unlimited access to his
corporate laptop so that he can use it freely.

Don't mean to point fingers but how else do you get an isolated system
involved in your project scope?

Thank you for pointing fingers here.
FYI my client has a NAC with VERY restrictive limitations for guests.
That is why I am describing the system as isolated here.


Enis


On 30 November 2011 23:00, Tim Brown <tmb () 65535 com> wrote:
On Monday 28 Nov 2011 00:57:44 Lukas Kuzmiak wrote:
just came across this tool from pentestmonkey, seems to be very nice.

http://code.google.com/p/windows-privesc-check/


I don't often post here, but since it's come up, you all might well like
wpc's
older brother unix-privesc-check also written by pentestmonkey (and which
I've
kinda inherited).  I'm working on v2 of the latter at the moment.  Neither
are
perfect but they do offer some quick wins on penetration tests.

Tim
--
Tim Brown
<mailto:tmb () 65535 com>

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




--
http://www.enissahin.com | http://twitter.com/enis_sahin
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: