Skip to content
This repository has been archived by the owner on May 5, 2022. It is now read-only.

Mongoose Windows Agent Guide

Lawrence Amer edited this page Aug 18, 2019 · 16 revisions

by using mongoose windows privilege escalation enumeration . you will discover so many features through enumeration process that's make it Helpful for your pentesting tasks .

Banner information

While first executing Mongoose will help you to detect if the target is vulnerable to a common windows kernel exploit rotten potato . with system information and status of powershell Quickly .

User information

Retrieving user information for security purposes through mongoose by typing -u to start the task immediately.all information regarding roles , current permissions , enabled / disabled token privileges , net local users are included on this option .

Services Enumeration

Getting Active Services , and Drivers through executing agent with -s Parameter . Mongoose in all his calls depends on windows kernel API to retrieve these information.

Network Enumeration

By Mongoose you will be able to get all information related to Network Operations and Active connections , active sessions by executing agent with -n parameter

Potential Files

Advanced File Search engine and indexing is built on Mongoose Agent , during Scanning the whole Server mongoose will be able to search for different file extensions at the same time by passing -c parameter .

System information Enumeration

Mongoose agent allow you to start enumerating basic , helpful system information , active login sessions by typing -i

Access Check Enumeration techniques

Mongoose will use two methods to check for current permission . one using icacls and other using builtin function to scan all system for possible write access permission .

Clone this wiki locally