Skip to content
This repository has been archived by the owner on May 5, 2022. It is now read-only.

Mongoose Windows Agent Guide

Lawrence Amer edited this page Aug 18, 2019 · 16 revisions

by using mongoose windows privilege escalation enumeration . you will discover so many features through enumeration process that's make it Helpful for your pentesting tasks .

Banner information

While first executing Mongoose will help you to detect if the target is vulnerable to a common windows kernel exploit rotten potato . with system information and status of powershell Quickly .

User information

Retrieving user information for security purposes through mongoose by typing -u to start the task immediately.all information regarding roles , current permissions , enabled / disabled token privileges , net local users are included on this option .

Services Enumeration

Getting Active Services , and Drivers through executing agent with -s Parameter . Mongoose in all his calls depends on windows kernel API to retrieve these information.

Network Enumeration

By Mongoose you will be able to get all information related to Network Operations and Active connections , active sessions by executing agent with -n parameter

Potential Files

Advanced File Search engine and indexing is built on Mongoose Agent , during Scanning the whole Server mongoose will be able to search for different file extensions at the same time by passing -c parameter .

Clone this wiki locally