Windows Privilege Escalation

For this we need to be in network like any kind of shell.

Resources:

  1. Please see the attached link for a list of all resources used in the course. A very special thanks goes to Grimmie for putting this together! <3

    https://github.com/Gr1mmie/Windows-Priviledge-Escalation-Resources

Initial Enumeration

#System Enumeration
systeminfo
systeminfo | findstr /b /c:"OS Name" /c:"OS Versoin" /c:"System Type"
wmic qfe
wmic qfe Caption,Description,HotFixID,InstalledOn
wmic logicaldisk
wmic logicaldisk get caption,description,providername
wmic logicaldisk get caption

#User Enumeration
whoami
whoami /priv
whoami /groups
net user    #to view users on this machine
net user <username>
net localgroup
net localgroup <group_name>

#Network Enumeration
ipconfig
ipconfig /all
arp -a
route print
netstat -ano

#Password Hunting
findstr /si password *.txt
findstr /si password *.txt *.ini *.config

#AV Enumeration
sc query windefend
sc queryex type=service
netsh advfirewall firewall dump
netsh firewall show state
netsh firewall show config

Automated Tool for Enumeration

Kernel Exploits

Passwords and Port Forwarding

Windows Subsystem for Linux

Impersonation and Potato Attacks

getsystem

RunAs

Registry

Executable Files

Startup Applications

DLL Hijacking

Service Permissions (Paths)

Last updated