HackTool - winPEAS Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on book.hacktricks.xyz

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (ORIGINALFILENAME = "winPEAS.exe" OR PROCESSNAME endswith "\winPEASany_ofs.exe,\winPEASany.exe,\winPEASx64_ofs.exe,\winPEASx64.exe,\winPEASx86_ofs.exe,\winPEASx86.exe") OR COMMANDLINE contains " applicationsinfo, browserinfo, eventsinfo, fileanalysis, filesinfo, processinfo, servicesinfo, windowscreds" OR COMMANDLINE contains "https://github.com/carlospolop/PEASS-ng/releases/latest/download/" OR (PARENTPROCESSCOMMANDLINE endswith " -linpeas" OR COMMANDLINE endswith " -linpeas") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Georg Lauenstein (sure[secure])