From 13d3b1ab8916bfc713a8f0d83ff366c29632faef Mon Sep 17 00:00:00 2001 From: HackTricks News Bot Date: Mon, 3 Nov 2025 18:51:13 +0000 Subject: [PATCH] =?UTF-8?q?Add=20winpeas=20privilege=20escalation=20checks?= =?UTF-8?q?=20from:=20Recent=20Vulnerabilities=20in=20Redis=20Server?= =?UTF-8?q?=E2=80=99s=20Lua=20Scripting=20Engine?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- winPEAS/winPEASexe/README.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/winPEAS/winPEASexe/README.md b/winPEAS/winPEASexe/README.md index 8dd211c..3e62b02 100755 --- a/winPEAS/winPEASexe/README.md +++ b/winPEAS/winPEASexe/README.md @@ -76,6 +76,8 @@ The goal of this project is to search for possible **Privilege Escalation Paths* New in this version: - Detect potential GPO abuse by flagging writable SYSVOL paths for GPOs applied to the current host and by highlighting membership in the "Group Policy Creator Owners" group. +- WSUS server RCE exposure check (CVE-2025-59287): detects local WSUS role, default listeners (TCP 8530/8531), and missing October 23, 2025 OOB updates (KB5070881/KB5070882/KB5070883). Flags likely vulnerable hosts and prints mitigation guidance. + It should take only a **few seconds** to execute almost all the checks and **some seconds/minutes during the lasts checks searching for known filenames** that could contain passwords (the time depened on the number of files in your home folder). By default only **some** filenames that could contain credentials are searched, you can use the **searchall** parameter to search all the list (this could will add some minutes). @@ -278,4 +280,4 @@ If you find any issue, please report it using **[github issues](https://github.c ## Advisory -All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission. +All the scripts/binaries of the PEAS Suite should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission. \ No newline at end of file