THM - Windows PrivEsc Arena

Students will learn how to escalate privileges using a very vulnerable Windows 7 VM. RDP is open. Your credentials are user:password321

connect rdp

rdesktop 10.10.50.130 -g 95%

PowerUp

"C:\Program Files\File Permissions Service\filepermservice.exe"

Code C to make privesc in win7

Service Escalation - Registry

Detection

Exploitation

To Delete user from group

Escalation va Unquoted Path

nqoted path

Registry Escalation - AlwaysInstallElevated

1.Open command prompt and type: reg query HKLM\Software\Policies\Microsoft\Windows\Installer 2.From the output, notice that “AlwaysInstallElevated” value is 1

1.Place ‘setup.msi’ in ‘C:\Temp’. 2.Open command prompt and type: msiexec /quiet /qn /i C:\Temp\setup.msi

Service Escalation - Executable Files

Service Escalation - DLL Hijacking

Last updated