module

Windows Gather Local Admin Search

Disclosed
N/A
Created
2018-05-30

Description

This module will identify systems in a given range that the
supplied domain user (should migrate into a user pid) has administrative
access to by using the Windows API OpenSCManagerA to establishing a handle
to the remote host. Additionally it can enumerate logged in users and group
membership via Windows API NetWkstaUserEnum and NetUserGetGroups.

Authors

Brandon McCann "zeknox" bmccann@accuvant.com
Thomas McCarthy "smilingraccoon" smilingraccoon@gmail.com
Royce Davis "r3dy" rdavis@accuvant.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use post/windows/gather/local_admin_search_enum
msf post(local_admin_search_enum) > show actions
...actions...
msf post(local_admin_search_enum) > set ACTION < action-name >
msf post(local_admin_search_enum) > show options
...show and set options...
msf post(local_admin_search_enum) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.