MagicWinPwn is a powerful and automated Windows privilege escalation script designed to help security professionals and CTF enthusiasts uncover potential misconfigurations, vulnerabilities, and weaknesses that can lead to privilege escalation.
To execute MagicWinPwn run:
powershell -ep bypass -f .\MagicWinPwn.ps1or if the machine has internet access run it directly off github:
iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/Mag1cByt3s/MagicWinPwn/refs/heads/main/MagicWinPwn.ps1'))| Option | Description |
|---|---|
-All |
Run all privilege escalation checks |
-Services |
Check for vulnerable services |
-Registry |
Identify registry misconfigurations |
-Credentials |
Search for stored credentials |
-Report |
Generate a structured report |
- Automated privilege escalation enumeration
- Checks for common misconfigurations and vulnerabilities
- Identifies weak permissions, stored credentials, and exploitable services
- Enumerates network configuration, ARP table, and routing information
- Enumerates named pipes for potential C2 detection and privilege escalation opportunities
- Checks Windows Defender and AppLocker security controls
- Generates structured output for better readability
- Lightweight and standalone (No dependencies required)
- Enumerates detailed system information (patches, environment variables, installed software)
- Analyzes PATH directories for write permissions
- Lists running processes with executable paths and command lines
- Enumerates logged-in users, all local users, and groups
- Retrieves password policy and account information
- Identifies installed software through multiple methods
- Interesting Files Hunter
MagicWinPwn automates various Windows privilege escalation techniques, including:
- Basic System Information (OS, user privileges, architecture)
- User Privileges & Groups (Identifies admin access & privilege levels)
- Network Configuration (Interfaces, IP addresses, DNS, ARP, routing table, listening ports, named pipes)
- Security Controls (Windows Defender status, AppLocker policies)
- Service Misconfigurations (Unquoted service paths, weak permissions)
- Scheduled Tasks & Startup Applications (Auto-elevated execution paths)
- Stored Credentials & Passwords (SAM, LSA Secrets, Credential Manager)
- Weak File & Registry Permissions (DLL hijacking, writable registry keys)
- Windows Exploit Checks (Common CVEs and known escalation paths)
- Enhanced System Information (Installed patches, environment variables, software inventory)
- Process Enumeration (Running processes with full paths and command lines)
- User & Group Enumeration (All users, groups, password policies, logged-in users)
- PATH Analysis (Identifies writable directories in system PATH)
- Interesting Files & Secrets (Quick hits on IIS/web configs,
%WINDIR%\repair\*,%WINDIR%\system32\config\*.sav/SecEvent.Evt, app hot spots like mRemoteNG/FileZilla/WinSCP/PSReadLine; optional-Deepfilename/content sweep for common secrets)
MagicWinPwn includes advanced security control enumeration:
- AppLocker Policy Analysis: Tests over 40 common executables against AppLocker policies
- LOLBins Testing: Checks restrictions on living-off-the-land binaries commonly used in attacks
- Writable Directory Identification: Highlights common bypass locations for AppLocker restrictions
- Comprehensive Defender Status: Detailed Windows Defender protection feature enumeration
PS C:\Users\htb-student\Desktop> .\MagicWinPwn.ps1
__ __ _ __ __ _ ____
| \/ | __ _ __ _ (_) ___ \ \ / / (_) _ __ | _ \ __ __ _ __
| |\/| | / _ | / _| | | / __| \ \ /\ / / | | | '_ \ | |_) | \ \ /\ / / | '_ \
| | | | | (_| | | (_| | | | | (__ \ V V / | | | | | | | __/ \ V V / | | | |
|_| |_| \__,_| \__, | |_| \___| \_/\_/ |_| |_| |_| |_| \_/\_/ |_| |_|
|___/
Windows Privilege Escalation Script
By @Mag1cByt3s
(https://github.com/Mag1cByt3s/MagicWinPwn)
[2025-10-04 01:39:29] Gathering enhanced system information...
[+] Detailed System Information:
Host Name: WINLPE-SRV01
OS Name: Microsoft Windows Server 2016 Standard
OS Version: 10.0.14393 N/A Build 14393
System Boot Time: 10/4/2025, 1:02:12 AM
System Manufacturer: VMware, Inc.
System Model: VMware7,1
System Type: x64-based PC
BIOS Version: VMware, Inc. VMW71.00V.24504846.B64.2501180334, 1/18/2025
Domain: WORKGROUP
Hotfix(s): 4 Hotfix(s) Installed.
[+] Environment Variables:
TEMP: C:\Users\HTB-ST~1\AppData\Local\Temp\2
PATH: C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\Microsoft SQL Server\Client SDK\ODBC\130\Tools\Binn\;C:\Program Files (x86)\Microsoft SQL Server\130\Tools\Binn\;C:\Program Files\Microsoft SQL Server\130\Tools\Binn\;C:\Program Files\Microsoft SQL Server\130\DTS\Binn\;C:\Program Files (x86)\Microsoft SQL Server\150\DTS\Binn\;C:\Program Files\Azure Data Studio\bin;C:\Program Files\PuTTY\;C:\Users\htb-student\AppData\Local\Microsoft\WindowsApps;
USERNAME: htb-student
PROCESSOR_ARCHITECTURE: AMD64
APPDATA: C:\Users\htb-student\AppData\Roaming
USERPROFILE: C:\Users\htb-student
COMPUTERNAME: WINLPE-SRV01
HOMEDRIVE: C:
HOMEPATH: \Users\htb-student
LOCALAPPDATA: C:\Users\htb-student\AppData\Local
[+] PATH Analysis:
C:\Program Files (x86)\Common Files\Oracle\Java\javapath
C:\Windows\system32
C:\Windows
C:\Windows\System32\Wbem
C:\Windows\System32\WindowsPowerShell\v1.0\
C:\Program Files\Microsoft SQL Server\Client SDK\ODBC\130\Tools\Binn\
C:\Program Files (x86)\Microsoft SQL Server\130\Tools\Binn\
C:\Program Files\Microsoft SQL Server\130\Tools\Binn\
C:\Program Files\Microsoft SQL Server\130\DTS\Binn\
C:\Program Files (x86)\Microsoft SQL Server\150\DTS\Binn\ (Does not exist)
C:\Program Files\Azure Data Studio\bin
C:\Program Files\PuTTY\
C:\Users\htb-student\AppData\Local\Microsoft\WindowsApps
[+] Installed Patches:
KB3199986 - Update - 11/21/2016 00:00:00
KB5001078 - Security Update - 03/25/2021 00:00:00
KB4054590 - Update - 03/30/2021 00:00:00
KB3200970 - Security Update - 04/13/2021 00:00:00
[+] Installed Software:
SQL Server 2016 Database Engine Shared (13.2.5026.0)
Microsoft OLE DB Driver for SQL Server (18.3.0.0)
Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219 (10.0.40219)
Microsoft Help Viewer 2.3 (2.3.28107)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
Microsoft Visual C++ 2019 X64 Additional Runtime - 14.28.29914 (14.28.29914)
Microsoft ODBC Driver 13 for SQL Server (13.2.5026.0)
SQL Server 2016 Database Engine Shared (13.2.5026.0)
SQL Server 2016 Database Engine Services (13.2.5026.0)
SQL Server Management Studio for Reporting Services (15.0.18369.0)
Microsoft SQL Server 2008 Setup Support Files (10.3.5500.0)
SSMS Post Install Tasks (15.0.18369.0)
Microsoft VSS Writer for SQL Server 2016 (13.2.5026.0)
Java 8 Update 231 (64-bit) (8.0.2310.11)
Browser for SQL Server 2016 (13.2.5026.0)
Integration Services (15.0.2000.130)
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.24.28127 (14.24.28127)
SQL Server 2016 Database Engine Services (13.2.5026.0)
SQL Server 2016 DMF (13.0.1601.5)
Microsoft SQL Server 2012 Native Client (11.4.7462.6)
VMware Tools (11.1.1.16303738)
SQL Server 2016 Shared Management Objects (13.0.16107.4)
SQL Server 2016 Connection Info (13.0.16108.4)
Microsoft ODBC Driver 17 for SQL Server (17.5.1.1)
SQL Server 2016 Common Files (13.2.5026.0)
SQL Server 2016 Connection Info (13.0.16108.4)
SuperPuTTY (1.4.0.8)
Sql Server Customer Experience Improvement Program (13.2.5026.0)
Visual Studio 2017 Isolated Shell for SSMS (15.0.28307.421)
Microsoft SQL Server Data-Tier Application Framework (x86) (13.0.3225.4)
SQL Server 2016 Shared Management Objects (13.0.16107.4)
Microsoft Analysis Services OLE DB Provider (15.0.2000.568)
SQL Server 2016 Shared Management Objects Extensions (13.2.5026.0)
SQL Server 2016 Batch Parser (13.0.1601.5)
SQL Server 2016 Shared Management Objects Extensions (13.2.5026.0)
Microsoft Visual C++ 2019 X64 Minimum Runtime - 14.28.29914 (14.28.29914)
SQL Server 2016 Database Engine Services (13.2.5026.0)
Microsoft SQL Server 2016 Setup (English) (13.2.5026.0)
Microsoft SQL Server 2016 RsFx Driver (13.2.5026.0)
SQL Server Management Studio (15.0.18369.0)
PuTTY release 0.75 (64-bit) (0.75.0.0)
Microsoft SQL Server 2016 T-SQL ScriptDom (13.2.5026.0)
Microsoft Visual Studio Tools for Applications 2017 x64 Hosting Support (15.0.27520)
SQL Server 2016 Database Engine Services (13.2.5026.0)
Microsoft SQL Server 2016 T-SQL Language Service (13.0.14500.10)
Microsoft Analysis Services OLE DB Provider (15.0.2000.568)
SQL Server 2016 SQL Diagnostics (13.0.1601.5)
Microsoft Visual Studio Tools for Applications 2017 x86 Hosting Support (15.0.27520)
SQL Server 2016 XEvent (13.0.1601.5)
SQL Server Management Studio (15.0.18369.0)
SQL Server 2016 DMF (13.0.1601.5)
SQL Server Management Studio for Analysis Services (15.0.18369.0)
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.24.28127 (14.24.28127)
SQL Server 2016 Common Files (13.2.5026.0)
Java Auto Updater (2.8.231.11)
SQL Server 2016 XEvent (13.0.1601.5)
[2025-10-04 01:41:40] Enumerating current user information...
[+] Current User Information:
Username: WINLPE-SRV01\htb-student
Is Administrator: False
[+] Group Memberships:
- WINLPE-SRV01\None
- Everyone
- BUILTIN\Remote Desktop Users
- BUILTIN\Users
- NT AUTHORITY\REMOTE INTERACTIVE LOGON
- NT AUTHORITY\INTERACTIVE
- NT AUTHORITY\Authenticated Users
- NT AUTHORITY\This Organization
- NT AUTHORITY\Local account
- LOCAL
- NT AUTHORITY\NTLM Authentication
[+] Assigned Privileges:
Privilege Name | Description | State
--------------------------------------------------------------------------------------------
SeChangeNotifyPrivilege | Bypass traverse checking | Enabled
[2025-10-04 01:41:40] Gathering network information...
[+] Network Interfaces and IP Configuration:
Windows IP Configuration
Host Name . . . . . . . . . . . . : WINLPE-SRV01
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : htb
Ethernet adapter Ethernet1:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter
Physical Address. . . . . . . . . : 00-50-56-94-2F-E6
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::e0b7:e3f5:bc88:ee8a%2(Preferred)
IPv4 Address. . . . . . . . . . . : 172.16.20.45(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.254.0
Default Gateway . . . . . . . . . : 172.16.20.1
DHCPv6 IAID . . . . . . . . . . . : 151015510
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-30-72-8C-E5-00-50-56-94-2F-E6
DNS Servers . . . . . . . . . . . : 8.8.8.8
NetBIOS over Tcpip. . . . . . . . : Enabled
Ethernet adapter Ethernet0 2:
Connection-specific DNS Suffix . : .htb
Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter #2
Physical Address. . . . . . . . . : 00-50-56-94-42-D0
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : dead:beef::238(Preferred)
Lease Obtained. . . . . . . . . . : Saturday, October 4, 2025 1:02:22 AM
Lease Expires . . . . . . . . . . : Saturday, October 4, 2025 2:32:22 AM
IPv6 Address. . . . . . . . . . . : dead:beef::5535:dafa:33e4:4e80(Preferred)
Link-local IPv6 Address . . . . . : fe80::5535:dafa:33e4:4e80%4(Preferred)
IPv4 Address. . . . . . . . . . . : 10.129.43.43(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Lease Obtained. . . . . . . . . . : Saturday, October 4, 2025 1:02:22 AM
Lease Expires . . . . . . . . . . : Saturday, October 4, 2025 2:32:22 AM
Default Gateway . . . . . . . . . : fe80::250:56ff:fe94:53e%4
10.129.0.1
DHCP Server . . . . . . . . . . . : 10.129.0.1
DHCPv6 IAID . . . . . . . . . . . : 436228182
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-30-72-8C-E5-00-50-56-94-2F-E6
DNS Servers . . . . . . . . . . . : 1.1.1.1
8.8.8.8
NetBIOS over Tcpip. . . . . . . . : Enabled
Connection-specific DNS Suffix Search List :
htb
Ethernet adapter Ethernet:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Windscribe VPN
Physical Address. . . . . . . . . : 00-FF-B3-3C-CD-5A
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Tunnel adapter isatap..htb:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : .htb
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Tunnel adapter isatap.{02D6F04C-A625-49D1-A85D-4FB454FBB3DB}:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
[+] ARP Table:
Interface: 172.16.20.45 --- 0x2
Internet Address Physical Address Type
172.16.21.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
239.255.255.250 01-00-5e-7f-ff-fa static
Interface: 10.129.43.43 --- 0x4
Internet Address Physical Address Type
10.129.0.1 00-50-56-94-05-3e dynamic
10.129.127.67 00-50-56-94-fc-11 dynamic
10.129.205.250 00-50-56-94-a9-5c dynamic
10.129.226.32 00-50-56-94-b1-86 dynamic
10.129.248.226 00-50-56-94-63-af dynamic
10.129.255.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
239.255.255.250 01-00-5e-7f-ff-fa static
255.255.255.255 ff-ff-ff-ff-ff-ff static
[+] Routing Table:
===========================================================================
Interface List
2...00 50 56 94 2f e6 ......vmxnet3 Ethernet Adapter
4...00 50 56 94 42 d0 ......vmxnet3 Ethernet Adapter #2
7...00 ff b3 3c cd 5a ......Windscribe VPN
1...........................Software Loopback Interface 1
9...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
6...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
===========================================================================
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.20.1 172.16.20.45 271
0.0.0.0 0.0.0.0 10.129.0.1 10.129.43.43 15
10.129.0.0 255.255.0.0 On-link 10.129.43.43 271
10.129.43.43 255.255.255.255 On-link 10.129.43.43 271
10.129.255.255 255.255.255.255 On-link 10.129.43.43 271
127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
172.16.20.0 255.255.254.0 On-link 172.16.20.45 271
172.16.20.45 255.255.255.255 On-link 172.16.20.45 271
172.16.21.255 255.255.255.255 On-link 172.16.20.45 271
224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
224.0.0.0 240.0.0.0 On-link 10.129.43.43 271
224.0.0.0 240.0.0.0 On-link 172.16.20.45 271
255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
255.255.255.255 255.255.255.255 On-link 10.129.43.43 271
255.255.255.255 255.255.255.255 On-link 172.16.20.45 271
===========================================================================
Persistent Routes:
Network Address Netmask Gateway Address Metric
0.0.0.0 0.0.0.0 172.16.20.1 Default
===========================================================================
IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
4 271 ::/0 fe80::250:56ff:fe94:53e
1 331 ::1/128 On-link
4 271 dead:beef::/64 On-link
4 271 dead:beef::238/128 On-link
4 271 dead:beef::5535:dafa:33e4:4e80/128
On-link
4 271 fe80::/64 On-link
2 271 fe80::/64 On-link
4 271 fe80::5535:dafa:33e4:4e80/128
On-link
2 271 fe80::e0b7:e3f5:bc88:ee8a/128
On-link
1 331 ff00::/8 On-link
4 271 ff00::/8 On-link
2 271 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
[+] Listening Ports:
Proto Local Address Process ID Process Name
-----------------------------------------------------
TCP 0.0.0.0:21 1976 FileZilla Server
TCP 0.0.0.0:80 4 System
TCP 0.0.0.0:135 848 svchost
TCP 0.0.0.0:445 4 System
TCP 0.0.0.0:1433 3300 sqlservr
TCP 0.0.0.0:3389 992 svchost
TCP 0.0.0.0:5985 4 System
TCP 0.0.0.0:8080 2152 Tomcat8
TCP 0.0.0.0:47001 4 System
TCP 0.0.0.0:49664 552 wininit
TCP 0.0.0.0:49665 104 svchost
TCP 0.0.0.0:49666 984 svchost
TCP 0.0.0.0:49667 2012 spoolsv
TCP 0.0.0.0:49668 1840 svchost
TCP 0.0.0.0:49669 696 lsass
TCP 0.0.0.0:49670 680 services
TCP 10.129.43.43:139 4 System
TCP 127.0.0.1:14147 1976 FileZilla Server
TCP 172.16.20.45:139 4 System
TCP [::]:21 1976 FileZilla Server
TCP [::]:80 4 System
TCP [::]:135 848 svchost
TCP [::]:445 4 System
TCP [::]:1433 3300 sqlservr
TCP [::]:3389 992 svchost
TCP [::]:5985 4 System
TCP [::]:8080 2152 Tomcat8
TCP [::]:47001 4 System
TCP [::]:49664 552 wininit
TCP [::]:49665 104 svchost
TCP [::]:49666 984 svchost
TCP [::]:49667 2012 spoolsv
TCP [::]:49668 1840 svchost
TCP [::]:49669 696 lsass
TCP [::]:49670 680 services
TCP [::1]:14147 1976 FileZilla Server
[2025-10-04 01:41:41] Enumerating named pipes...
[+] Named Pipes:
Total Named Pipes Found: 36
Name
----
atsvc
Ctx_WinStation_API_service
epmapper
eventlog
InitShutdown
lsass
LSM_API_service
MSSQL$SQLEXPRESS01\sql\query
ntsvcs
PIPE_EVENTROOT\CIMV2SCM EVENT PROVIDER
PSHost.134040389396289317.4548.DefaultAppDomain.powershell
PSHost.134040407300663138.6524.DefaultAppDomain.powershell
scerpc
SessEnvPublicRpc
spoolss
SQLLocal\SQLEXPRESS01
srvsvc
TDLN-4520-41
TDLN-6076-41
TDLN-6304-41
TDLN-7704-41
TermSrv_API_service
trkwks
TSVCPIPE-edb8a28f-5e81-4af0-ad53-083633ec493f
vgauth-service
W32TIME_ALT
WindscribeService
Winsock2\CatalogChangeListener-228-0
Winsock2\CatalogChangeListener-2a8-0
Winsock2\CatalogChangeListener-2b8-0
Winsock2\CatalogChangeListener-350-0
Winsock2\CatalogChangeListener-3d8-0
Winsock2\CatalogChangeListener-68-0
Winsock2\CatalogChangeListener-730-0
Winsock2\CatalogChangeListener-7dc-0
wkssvc
[+] Interesting Named Pipes (Potential C2 or Vulnerable Services):
[!] atsvc
[!] epmapper
[!] eventlog
[!] lsass
[!] ntsvcs
[!] PSHost.134040389396289317.4548.DefaultAppDomain.powershell
[!] PSHost.134040407300663138.6524.DefaultAppDomain.powershell
[!] scerpc
[!] spoolss
[!] srvsvc
[!] trkwks
[!] WindscribeService
[!] Winsock2\CatalogChangeListener-228-0
[!] Winsock2\CatalogChangeListener-2a8-0
[!] Winsock2\CatalogChangeListener-2b8-0
[!] Winsock2\CatalogChangeListener-350-0
[!] Winsock2\CatalogChangeListener-3d8-0
[!] Winsock2\CatalogChangeListener-68-0
[!] Winsock2\CatalogChangeListener-730-0
[!] Winsock2\CatalogChangeListener-7dc-0
[!] wkssvc
[2025-10-04 01:41:41] Checking security controls...
[+] Windows Defender Status:
AntiVirus Enabled : True
Real-Time Protection : False
Behavior Monitoring : False
IOAV Protection : False
OnAccess Protection : False
NIS Enabled : False
Signature Age : 1518 days (POSSIBLY OUTDATED)
[+] Testing Common Executables Against AppLocker Policy:
C:\Windows\System32\cmd.exe : Denied
C:\Windows\System32\wscript.exe : Allowed
C:\Windows\System32\cscript.exe : Allowed
C:\Windows\System32\mshta.exe : Allowed
C:\Windows\System32\rundll32.exe : Allowed
C:\Windows\System32\regsvr32.exe : Allowed
C:\Windows\System32\scriptrunner.exe : Allowed
C:\Windows\System32\certutil.exe : Allowed
C:\Windows\System32\bitsadmin.exe : Allowed
C:\Windows\System32\at.exe : Allowed
C:\Windows\System32\schtasks.exe : Allowed
C:\Windows\System32\winrs.exe : Allowed
C:\Windows\System32\control.exe : Allowed
C:\Windows\System32\cmstp.exe : Allowed
C:\Windows\System32\esentutl.exe : Allowed
C:\Windows\System32\expand.exe : Allowed
C:\Windows\System32\extrac32.exe : Allowed
C:\Windows\System32\findstr.exe : Allowed
C:\Windows\System32\forfiles.exe : Allowed
C:\Windows\System32\ftp.exe : Allowed
C:\Windows\System32\makecab.exe : Allowed
C:\Windows\System32\mavinject.exe : Allowed
C:\Windows\System32\odbcconf.exe : Allowed
C:\Windows\System32\pcalua.exe : Allowed
C:\Windows\System32\pcwrun.exe : Allowed
C:\Windows\System32\presentationhost.exe : Allowed
C:\Windows\System32\print.exe : Allowed
C:\Windows\System32\replace.exe : Allowed
C:\Windows\System32\robocopy.exe : Allowed
C:\Windows\System32\runas.exe : Allowed
C:\Windows\System32\syncappvpublishingserver.exe : Allowed
C:\Windows\System32\wbem\wmic.exe : Allowed
C:\Windows\System32\winsat.exe : Allowed
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe : Allowed
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe : Allowed
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe : Allowed
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe : Allowed
C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe : Denied
[2025-10-04 01:41:43] Enumerating user and group information...
[+] Logged-In Users:
USERNAME SESSIONNAME ID STATE IDLE TIME LOGON TIME
sccm_svc console 1 Active none 10/4/2025 1:02 AM
>htb-student rdp-tcp#0 2 Active 1 10/4/2025 1:04 AM
[+] All Users:
- Administrator
- DefaultAccount
- Guest
- helpdesk
- htb-student
- htb-student_adm
- jordan
- logger
- mrb3n
- sarah
- sccm_svc
- secsvc
- sql_dev
[+] All Groups:
- Access Control Assistance Operators
- Administrators
- Backup Operators
- Certificate Service DCOM Access
- Cryptographic Operators
- Distributed COM Users
- Event Log Readers
- Guests
- Hyper-V Administrators
- IIS_IUSRS
- Network Configuration Operators
- Performance Log Users
- Performance Monitor Users
- Power Users
- Print Operators
- RDS Endpoint Servers
- RDS Management Servers
- RDS Remote Access Servers
- Remote Desktop Users
- Remote Management Users
- Replicator
- SQLServer2005SQLBrowserUser$WINLPE-SRV01
- Storage Replica Administrators
- System Managed Accounts Group
- Users
[+] Password Policy:
Force user logoff how long after time expires?: Never
Minimum password age (days): 0
Maximum password age (days): Unlimited
Minimum password length: 0
Length of password history maintained: None
Lockout threshold: Never
Lockout duration (minutes): 30
Lockout observation window (minutes): 30
Computer role: SERVER
[2025-10-04 01:41:43] Enumerating running processes...
[+] Running Processes:
0: System Idle Process
4: System
332: smss.exe
436: csrss.exe
544: csrss.exe
552: wininit.exe
608: winlogon.exe
680: services.exe
696: lsass.exe
788: svchost.exe
848: svchost.exe
964: dwm.exe
984: svchost.exe
992: svchost.exe
104: svchost.exe
316: svchost.exe
1052: svchost.exe
1088: vm3dservice.exe
1120: svchost.exe
1188: svchost.exe
1428: svchost.exe
1480: svchost.exe
1840: svchost.exe
2012: spoolsv.exe
1632: inetinfo.exe
1976: FileZilla Server.exe
2056: svchost.exe
2088: svchost.exe
2132: svchost.exe
2152: Tomcat8.exe
2164: VGAuthService.exe
2188: svchost.exe
2212: WindscribeService.exe
2220: MsMpEng.exe
2260: vmtoolsd.exe
2276: svchost.exe
2284: svchost.exe
2304: sqlwriter.exe
2468: conhost.exe
3300: sqlservr.exe
3312: sqlceip.exe
3448: dllhost.exe
3632: WmiPrvSE.exe
3648: msdtc.exe
4808: RuntimeBroker.exe
4912: sihost.exe
4940: svchost.exe
5020: GoogleUpdate.exe
5060: taskhostw.exe
4112: WmiPrvSE.exe
5852: ServerManager.exe
6124: svchost.exe
5892: vm3dservice.exe
5948: vmtoolsd.exe
5804: FileZilla Server Interface.exe
5792: jusched.exe
716: csrss.exe
856: winlogon.exe
1888: dwm.exe
5940: rdpclip.exe
Path: C:\Windows\System32\rdpclip.exe
Cmd: rdpclip
4484: sihost.exe
Path: C:\Windows\system32\sihost.exe
Cmd: sihost.exe
4512: svchost.exe
Path: C:\Windows\system32\svchost.exe
Cmd: C:\Windows\system32\svchost.exe -k UnistackSvcGroup
5904: taskhostw.exe
Path: C:\Windows\system32\taskhostw.exe
Cmd: taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
5640: RuntimeBroker.exe
Path: C:\Windows\System32\RuntimeBroker.exe
Cmd: C:\Windows\System32\RuntimeBroker.exe -Embedding
6948: vm3dservice.exe
Path: C:\Windows\System32\vm3dservice.exe
Cmd: "C:\Windows\System32\vm3dservice.exe" -u
7076: jusched.exe
Path: C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
Cmd: "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
6280: cmd.exe
Path: C:\Windows\system32\cmd.exe
Cmd: "C:\Windows\system32\cmd.exe"
6296: conhost.exe
Path: C:\Windows\system32\conhost.exe
Cmd: \??\C:\Windows\system32\conhost.exe 0x4
4548: powershell.exe
Path: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Cmd: powershell
3604: taskhostw.exe
4856: svchost.exe
7744: dbvis.exe
Path: C:\Program Files\DbVisualizer\dbvis.exe
Cmd: "C:\Program Files\DbVisualizer\dbvis.exe"
6524: powershell.exe
Path: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Cmd: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass
7776: msiexec.exe
7704: explorer.exe
Path: C:\Windows\explorer.exe
Cmd: explorer.exe
6304: explorer.exe
6076: ShellExperienceHost.exe
Path: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
Cmd: "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
4520: ShellExperienceHost.exe
8040: SearchUI.exe
Path: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
Cmd: "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
3344: SearchUI.exe
3064: backgroundTaskHost.exe
Path: C:\Windows\system32\backgroundTaskHost.exe
Cmd: "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca
6148: backgroundTaskHost.exe
5728: WmiPrvSE.exe
[2025-10-04 01:41:43] Enumeration complete.
Network configuration enumeration
Windows Defender and AppLocker status
Contributions are welcome! Feel free to submit a pull request or open an issue for any suggestions or improvements.
This project is licensed under the GNU General Public License v3 (GPLv3) - see the LICENSE file for details.
This tool is designed for educational purposes and authorized security testing only. The author is not responsible for any misuse or damage caused by this tool. Always ensure you have proper authorization before using this tool on any system.