Vulnerability & Exploit Database

Back to search

Windows Gather Local Admin Search

This module will identify systems in a given range that the supplied domain user (should migrate into a user pid) has administrative access to by using the Windows API OpenSCManagerA to establishing a handle to the remote host. Additionally it can enumerate logged in users and group membership via Windows API NetWkstaUserEnum and NetUserGetGroups.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

post/windows/gather/local_admin_search_enum

Authors

  • Brandon McCann "zeknox" <bmccann [at] accuvant.com>
  • Thomas McCarthy "smilingraccoon" <smilingraccoon [at] gmail.com>
  • Royce Davis "r3dy" <rdavis [at] accuvant.com>

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/windows/gather/local_admin_search_enum msf post(local_admin_search_enum) > sessions ...sessions... msf post(local_admin_search_enum) > set SESSION <session-id> msf post(local_admin_search_enum) > show options ...show and set options... msf post(local_admin_search_enum) > run