THM - Windows PrivEsc Arena
Students will learn how to escalate privileges using a very vulnerable Windows 7 VM. RDP is open. Your credentials are user:password321

connect rdp
rdesktop 10.10.50.130 -g 95%PowerUp


Code C to make privesc in win7
Service Escalation - Registry
Detection

Notice that the output suggests that user belong to “NT AUTHORITY\INTERACTIVE” has “FullContol” permission over the registry key.
Exploitation

To Delete user from group
Escalation va Unquoted Path

Registry Escalation - AlwaysInstallElevated
1.Open command prompt and type: reg query HKLM\Software\Policies\Microsoft\Windows\Installer 2.From the output, notice that “AlwaysInstallElevated” value is 1
1.Place ‘setup.msi’ in ‘C:\Temp’. 2.Open command prompt and type: msiexec /quiet /qn /i C:\Temp\setup.msi

Service Escalation - Executable Files

Service Escalation - DLL Hijacking

Last updated
