Exploring Weasel: A Windows Privilege Escalation Journey

In this blog post, I’ll take you on a journey through an infosec writeup that revolves around a penetration test on a Windows system, focusing on enumeration, initial foothold, and privilege escalation. The target system is codenamed “Weasel.”

Gathering Information

Nmap:

Our journey starts with an Nmap scan to gather information about the target system.

sudo nmap -sV -sC <IP>

Nmap Scan

The scan reveals open ports and services:

Website