Windows Privilege Escalation
For this we need to be in network like any kind of shell.
Resources:
Fuzzy Security Guide - https://www.fuzzysecurity.com/tutorials/16.html
Absolomb Windows Privilege Escalation Guide - https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
Sushant 747's Guide (Country dependant - may need VPN) - https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_windows.html
Please see the attached link for a list of all resources used in the course. A very special thanks goes to Grimmie for putting this together! <3
https://github.com/Gr1mmie/Windows-Priviledge-Escalation-Resources
Initial Enumeration
#System Enumeration
systeminfo
systeminfo | findstr /b /c:"OS Name" /c:"OS Versoin" /c:"System Type"
wmic qfe
wmic qfe Caption,Description,HotFixID,InstalledOn
wmic logicaldisk
wmic logicaldisk get caption,description,providername
wmic logicaldisk get caption
#User Enumeration
whoami
whoami /priv
whoami /groups
net user #to view users on this machine
net user <username>
net localgroup
net localgroup <group_name>
#Network Enumeration
ipconfig
ipconfig /all
arp -a
route print
netstat -ano
#Password Hunting
findstr /si password *.txt
findstr /si password *.txt *.ini *.config
#AV Enumeration
sc query windefend
sc queryex type=service
netsh advfirewall firewall dump
netsh firewall show state
netsh firewall show configAutomated Tool for Enumeration

Kernel Exploits
Passwords and Port Forwarding
Windows Subsystem for Linux
Impersonation and Potato Attacks
getsystem
RunAs
Registry
Executable Files
Startup Applications
DLL Hijacking
Service Permissions (Paths)
Last updated