PowerUp is a PowerShell-based privilege escalation tool from the PowerSploit framework. Unlike WinPEAS which only enumerates, PowerUp can both find AND exploit vulnerabilities automatically. It's like having a pentest robot.Related
PowerUp focuses on the most common and reliable Windows privilege escalation vectors: service misconfigurations, DLL hijacking, AlwaysInstallElevated, and more. It's your go-to tool when you need quick results.
PowerShell Required
PowerUp requires PowerShell. If PowerShell is restricted, you may need to bypass execution policies or use other tools instead.
Getting PowerUp
Invoke-AllChecks
The main command that runs all enumeration checks at once. This is your first stop when using PowerUp.
AbuseFunction
PowerUp tells you exactly how to exploit each finding with an "AbuseFunction". Run that function to automatically exploit the vulnerability!
Service-Related Checks
Service Exploitation Flow
DLL Hijacking Checks
Registry Checks
Credential Checks
GPP Passwords
Group Policy Preference passwords are encrypted with a known key (published by Microsoft!). PowerUp decrypts them automatically. These often contain domain admin credentials.
PowerUp Function Reference
PowerUp Methodology
PowerUp Workflow
1
ImportImport-Module .\PowerUp.ps1 or IEX download
2
All ChecksInvoke-AllChecks to enumerate
3
ReviewCheck output for AbuseFunction hints
4
ChooseSelect easiest/most reliable exploit
5
ExploitRun the AbuseFunction or manual exploit
6
VerifyConfirm privilege escalation succeeded
Knowledge Check
Challenges
Key Takeaways
- PowerUp both finds and exploits privilege escalation vectors
- Invoke-AllChecks runs all enumeration at once
- AbuseFunction tells you exactly how to exploit each finding
- Focus on: services, AlwaysInstallElevated, credentials
- Can automatically add admin user or run custom commands
- Combine with WinPEAS for comprehensive coverage