Cyber Research Wiki

WinPEAS

WinPEAS is an open-source Windows host enumeration tool that scans for misconfigurations, weak permissions, and environmental clues that could enable local privilege escalation during penetration testing and red-team assessments.

Overview

WinPEAS is a Windows-focused component of the PEASS-ng (Privilege Escalation Awesome Scripts – Next Generation) project maintained on GitHub. Distributed alongside LinPEAS and other artifacts, it concentrates on systematically collecting host, user, registry, service, and application context that is commonly associated with local privilege-escalation opportunities. The tool’s role is strictly enumerative: it surfaces indicators and configuration states that may correlate with escalation techniques but does not conduct exploitation. The project is closely linked to the HackTricks knowledge base, which documents the patterns WinPEAS seeks and explains their relevance. Active releases indicate ongoing maintenance and refinement of checks aligned with evolving Windows behaviors and known risky configurations.

What It Is

WinPEAS is a host-side discovery utility executed under the current Windows user context to highlight potential privilege-escalation paths. It inspects areas such as modifiable or misconfigured services, unquoted service paths, AlwaysInstallElevated policy settings, token privileges (for example, SeImpersonatePrivilege), credentials or secrets in files and the registry, DLL search-order or PATH hijack conditions, weak access controls, scheduled tasks, and the presence or configuration of security controls such as AppLocker or antivirus. Results are presented in a color-emphasized report to aid triage. Findings represent leads rather than proofs of exploitability; analysts are expected to validate impact and feasibility separately and within the constraints of rules of engagement.

How It Works

WinPEAS runs a modular sequence of checks implemented within the PEASS-ng codebase and aggregates their outcomes into structured console output. These checks read locally accessible operating system artifacts—Windows Registry hives, service and driver configurations, file system permissions, environment variables, scheduled tasks, user and group memberships, and network listeners—and compare them against patterns identified by the project as risky or noteworthy. The tool is released as binaries for common Windows architectures, with a batch-script variant maintained in releases. Project updates documented in release notes reflect continuous additions and adjustments, such as refining Windows-version–specific checks. In practice, it is invoked after initial access to rapidly surface plausible escalation avenues that can then be prioritized for manual verification or targeted tooling.

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high