In this blog post, I’ll take you on a journey through an infosec writeup that revolves around a penetration test on a Windows system, focusing on enumeration, initial foothold, and privilege escalation. The target system is codenamed “Weasel.”
Gathering Information
Nmap:
Our journey starts with an Nmap scan to gather information about the target system.
sudo nmap -sV -sC <IP>

Nmap Scan
The scan reveals open ports and services: