-
-
Notifications
You must be signed in to change notification settings - Fork 121
Mongoose Windows Agent Guide
by using mongoose windows privilege escalation enumeration . you will discover so many features through enumeration process that's make it Helpful for your pentesting tasks .
While first executing Mongoose will help you to detect if the target is vulnerable to a common windows kernel exploit rotten potato . with system information and status of powershell Quickly .
Retrieving user information for security purposes through mongoose by typing -u to start the task immediately.all information regarding roles , current permissions , enabled / disabled token privileges , net local users are included on this option .
Getting Active Services , and Drivers through executing agent with -s Parameter . Mongoose in all his calls depends on windows kernel API to retrieve these information.
By Mongoose you will be able to get all information related to Network Operations and Active connections , active sessions by executing agent with -n parameter
Advanced File Search engine and indexing is built on Mongoose Agent , during Scanning the whole Server mongoose will be able to search for different file extensions at the same time by passing -c parameter .
Mongoose agent allow you to start enumerating basic , helpful system information , active login sessions by typing -i
Mongoose will use two methods to check for current permission . one using icacls and other using builtin function to scan all system for possible write access permission .
by mongoose agent you can scan files with specific extensions the whole drivers by passing keyword you would like to pass. to use this function you can type -l {DRIVER} {STRING} {EXTENSION}