Skip to content

Latest commit

 

History

History
140 lines (105 loc) · 10.4 KB

checklist-windows-privilege-escalation.md

File metadata and controls

140 lines (105 loc) · 10.4 KB

Checklist - Local Windows Privilege Escalation

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Best tool to look for Windows local privilege escalation vectors: WinPEAS

  • Can you write in any folder inside PATH?
  • Is there any known service binary that tries to load any non-existant DLL?
  • Can you write in any binaries folder?
  • Enumerate the network (shares, interfaces, routes, neighbours, ...)
  • Take a special look at network services listening on localhost (127.0.0.1)
  • Have you access to any handler of a process run by administrator?
  • Check if you can abuse it

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}