Header Ads

Header ADS

Windows Local Privilege Escalation

Exercise  – Kernel

Detection
Windows VM
1. Open command prompt and run: powershell -nop -ep bypass
2. Import the Sherlock module by typing:
Import-Module C:\Users\User\Desktop\Tools\Sherlock\Sherlock.ps1
3. Scan for vulnerabilities by typing: Find-AllVulns










No comments

Powered by Blogger.