Skip to content
This repository has been archived by the owner on May 5, 2022. It is now read-only.

Mongoose Windows Agent Guide

Lawrence Amer edited this page Aug 18, 2019 · 16 revisions

by using mongoose windows privilege escalation enumeration . you will discover so many features through enumeration process that's make it Helpful for your pentesting tasks .

Banner information

While first executing Mongoose will help you to detect if the target is vulnerable to a common windows kernel exploit rotten potato . with system information and status of powershell Quickly .

User information

Retrieving user information for security purposes through mongoose by typing -u to start the task immediately.all information regarding roles , current permissions , enabled / disabled token privileges , net local users are included on this option .

Services Enumeration

Getting Active Services , and Drivers through executing agent with -s Parameter . Mongoose in all his calls depends on windows kernel API to retrieve these information.

Clone this wiki locally