Skip to content

Latest commit

 

History

History
31 lines (23 loc) · 864 Bytes

Privesc.md

File metadata and controls

31 lines (23 loc) · 864 Bytes

Privilege Escalation

There are various ways of locally escalating privileges on Windows box:

  • Missing patches
  • Automated deployment and AutoLogon passwords in clear text
  • AlwaysInstallElevated (Any user can run MSI as SYSTEM)
  • Misconfigured Services
  • DLL Hijacking and More

We can use below tools for complete coverage

Services issues using PowerUp

Get-ServiceUnquoted -Verbose

Get services where the current user can write to its binary path or change arguments to the binary

Get-ModifiableServiceFile -Verbose

Get the services whose configuration current user can modify.

Get-ModifiableService -Verbose