OSCP Playbook
Search
K
Comment on page

General

Escalation Vectors

  1. 1.
    Stored Credentials
  2. 2.
    Windows Kernel Exploit
  3. 3.
    DLL Injection
  4. 4.
    Unattended Answer File
  5. 5.
    Insecure File/Folder Permissions
  6. 6.
    Insecure Service Permissions
  7. 7.
    DLL Hijacking
  8. 8.
    Group Policy Preferences
  9. 9.
    Unquoted Service Path
  10. 10.
    Always Install Elevated
  11. 11.
    Token Manipulation
  12. 12.
    Insecure Registry Permissions
  13. 13.
    Autologon User Credential
  14. 14.
    User Account Control (UAC) Bypass
  15. 15.
    Insecure Named Pipes Permissions
  16. 16.
    Scheduled task

Checklist

  1. 1.
    Initial Information Gathering
  2. 2.
    Using script or manual enumeration
  3. 3.
    Use wmic for information gathering (see wmic script)
  4. 4.
    Review all info gathered
  5. 5.
    Look for some quick security fails which can be easily leveraged to upgrade our user privileges (see wmic script)
    wmic qfe get Caption,Description,HotFixID,InstalledOn
  6. 6.
    Look for password or any sensitive information
  7. 7.
    refer Interesting Files and Sensitive Information
  8. 8.
    Look at Windows services and file/folder permissions to escalate privilege
  9. 9.
    sc and accesschk.exe

Common technique