Red Team Village c0c0n 2020
Carlos Polop Martin - Awesome Privilege Escalation
Abstract: Local privilege escalation techniques are far beyond checking the Windows/Kernel version, looking for unquoted service paths or checking SUID binaries. Moreover, a local privilege escalation could make a huge difference when trying to comprise a domain. Several tools have been created to find possible privilege escalation paths, but most of the tools for Red Team and Pentesting just check for a few possible paths, so pentesters need to use several tools and do some manual recon to check for everything. During this talk Carlos will present a suite of open source privesc enumerators that he have created called PEASS (Privilege Escalation Awesome Scripts Suite). The goal of this suite is to check and highlight every possible privesc path so professionals don’t need to execute several different tools and can very easily find the vulnerabilities. At the moment, this suite contains the most complete and user friendly privesc enumerators for Windows (in .Net and bat) and Unix (Linux, MacOS, OpenBSD, FreeBSD). Notice that independently of the technical level of the audience they will learn some new privilege escalation vector. Carlos will be publishing his notes and Awesome PrivEsc scripts after th talk.
Join our Discord server: [ Ссылка ]
Website: [ Ссылка ]
Follow us on twitter: [ Ссылка ]
[ Ссылка ]
[ Ссылка ]_
Ещё видео!