Windows
Automated Enumeration
windows-privesc-check
waston
sherlock
powerSpliot/privesc/powerUp
windows-Exploit0Suggester
JAWS
WinPEAS
LinPEAS & linEnum
Windows Privilege Escalation
Discovery of Missing Patches
The discovery of missing patches can be identified easily either through manual methods or automatic. Manually this can be done easily be executing the following command which will enumerate all the installed patches.
Metasploit
PowerShell
There is also a PowerShell script which target to identify patches that can lead to privilege escalation. This script is called Sherlock and it will check a system for the following:
MS10-015 : User Mode to Ring (KiTrap0D)
MS10-092 : Task Scheduler
MS13-053 : NTUserMessageCall Win32k Kernel Pool Overflow
MS13-081 : TrackPopupMenuEx Win32k NULL Page
MS14-058 : TrackPopupMenu Win32k Null Pointer Dereference
MS15-051 : ClientCopyImage Win32k
MS15-078 : Font Driver Buffer Overflow
MS16-016 : ‘mrxdav.sys’ WebDAV
MS16-032 : Secondary Logon Handle
CVE-2017-7199 : Nessus Agent 6.6.2 – 6.10.3 Priv Esc
Privilege Escalation Table
The following table has been compiled to assist in the process of privilege escalation due to lack of sufficient patching.
Windows Server 2008 ,7,8,10 Windows Server 2012
Secondary Logon Handle
3143141
Windows Server 2003, Windows Server 2008, Windows 7, Windows 8, Windows 2012
Windows Kernel Mode Drivers
3057191
Windows Server 2003, Windows Server 2008, Windows Server 2012, 7, 8
Win32k.sys
3000061
Windows Server 2003, Windows Server 2008, 7, 8, Windows Server 2012
AFD Driver
2975684
Windows Server 2003, Windows Server 2008, 7, 8, Windows Server 2012
Kernel Mode Driver
2778930
Windows Server 2003, Windows Server 2008, 7, XP
KiTrap0D
977165
Windows Server 2003, Windows Server 2008, 7, 8, Windows Server 2012
Kernel Driver
3057839
Windows Server 2003, Windows Server 2008, 7, 8, Windows Server 2012
Hot Potato
3164038
Last updated