You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 5, 2022. It is now read-only.
Lawrence Amer edited this page Aug 18, 2019
·
16 revisions
by using mongoose windows privilege escalation enumeration . you will discover so many features through enumeration process that's make it Helpful for your pentesting tasks .
Banner information
While first executing Mongoose will help you to detect if the target is vulnerable to a common windows kernel exploit rotten potato . with system information and status of powershell Quickly .
User information
Retrieving user information for security purposes through mongoose by typing -u to start the task immediately.all information regarding roles , current permissions , enabled / disabled token privileges , net local users are included on this option .
Services Enumeration
Getting Active Services , and Drivers through executing agent with -s Parameter . Mongoose in all his calls depends on windows kernel API to retrieve these information.