WinPEAS (Windows Privilege Escalation Awesome Scripts) is the go-to automated enumeration tool for Windows. It checks hundreds of potential privilege escalation vectors and highlights what's interesting. Think of it as having an expert pentester scanning the system for you.
After manual enumeration, WinPEAS fills in the gaps and catches things you might miss. But don't just blindly run it - understand what it's looking for so you can interpret the output.Related
AV Detection
WinPEAS is flagged by most antivirus software. You may need to use obfuscation, disable AV (if possible), or use alternative methods like the .bat version which is less detected.
Getting WinPEAS
Version Matching
Use winPEASx64.exe on 64-bit systems and winPEASx86.exe on 32-bit. Running the wrong version may miss checks or fail to run. Check with: echo %PROCESSOR_ARCHITECTURE%
Running WinPEAS
Handling AV/EDR
Reading WinPEAS Output
Critical Findings to Watch For
Common WinPEAS Checks
Alternative Tools
Use Multiple Tools
Different tools catch different things. Run WinPEAS first, then PowerUp for a second opinion. Some vectors may be missed by one tool but caught by another.
Interpreting Results
WinPEAS Methodology
WinPEAS Workflow
1
TransferGet WinPEAS to target (correct architecture)
2
RunExecute with output redirection if possible
3
ReviewLook for RED/Yellow highlighted findings
4
PrioritizeFocus on: privileges, services, credentials
5
VerifyManually confirm exploitable conditions
6
ExploitUse appropriate technique for finding
Knowledge Check
Challenges
Key Takeaways
- WinPEAS automates comprehensive privilege escalation checks
- Red/Yellow output indicates critical, likely exploitable findings
- Use .bat version if .exe is blocked by AV
- Focus on: privileges, services, registry, credentials
- Always manually verify findings before exploitation
- Combine with PowerUp and other tools for complete coverage