General
Escalation Vectors
Stored Credentials
Windows Kernel Exploit
DLL Injection
Unattended Answer File
Insecure File/Folder Permissions
Insecure Service Permissions
DLL Hijacking
Group Policy Preferences
Unquoted Service Path
Always Install Elevated
Token Manipulation
Insecure Registry Permissions
Autologon User Credential
User Account Control (UAC) Bypass
Insecure Named Pipes Permissions
Scheduled task
Checklist
Initial Information Gathering
Using script or manual enumeration
Use wmic for information gathering (see wmic script)
Review all info gathered
Look for some quick security fails which can be easily leveraged to upgrade our user privileges (see wmic script)
Look for password or any sensitive information
refer Interesting Files and Sensitive Information
Look at Windows services and file/folder permissions to escalate privilege
sc
andaccesschk.exe
Common technique
Videos - YouTube
Last updated