Exploring Weasel: A Windows Privilege Escalation Journey
<p>In this blog post, I’ll take you on a journey through an infosec writeup that revolves around a penetration test on a Windows system, focusing on enumeration, initial foothold, and privilege escalation. The target system is codenamed “Weasel.”</p>
<h1>Gathering Information</h1>
<p><strong><em>Nmap:</em></strong></p>
<p>Our journey starts with an Nmap scan to gather information about the target system.</p>
<pre>
sudo nmap -sV -sC <IP></pre>
<p><img alt="" src="https://miro.medium.com/v2/resize:fit:1000/1*h1jQIgoedKQh2mwY06C2xw.png" style="height:358px; width:1000px" /></p>
<p>Nmap Scan</p>
<p>The scan reveals open ports and services:</p>
<p><a href="https://systemweakness.com/exploring-weasel-a-windows-privilege-escalation-journey-1c41b4d14459"><strong>Website</strong></a></p>