[WINPEAS] Add privilege escalation check: HTB TheFrizz (High-level, redacted for s... #494
+93
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🔧 Automated Privilege Escalation Check Addition
🤔 Privilege Escalation Reasoning
The post describes escalation to NT AUTHORITY\SYSTEM by abusing overly permissive Group Policy Object (GPO) permissions in an Active Directory environment. GPO misconfigurations that grant a user rights such as GenericAll/Write/WriteDacl over a GPO (or rights to modify gpLink on an OU that applies to the target computer) are a well-known Windows/AD privilege escalation vector. Detecting these mispermissions and signaling that the current principal can modify a GPO that applies to the local machine is squarely in scope for winPEAS. The other elements (Kerberos-only SSH auth, web RCE, and credential recovery from recycle bin) are not themselves privilege escalation techniques for linpeas/winpeas, though recycle bin credential hunting is already a general enumeration pattern.
🤖 Implementation Details
PEASS winpeas agent completed successfully with 125 items. Agent Comment: Summary of what I did
File modified: winPEAS/winPEASexe/winPEAS/Checks/SystemInfo.cs
What I added:
Code changes applied:
Where the change was added
How the new detection works
Notes and limitations
No sensitive_files.yaml updates were required, as this is not a file hunting feature.
Paths changed
Why this covers the blog’s escalation
winPEAS will now proactively highlight the same misconfiguration that enabled SYSTEM in the write-up.
🏗️ Builder Agent Response
WinPEAS validation agent completed successfully with 90 items. Agent Comment: Below is the full validation and remediation report for the WinPEAS C# codebase in the specified repository.
Context
What I did
Key technical notes on the new check
Actions taken
How to build locally on Windows (for future maintainers)
Confidence level
This PR was automatically created by the HackTricks Feed Bot. Please review the implementation carefully and test thoroughly before merging.