πŸ“‹Windows Privesc Checklist

Check for hidden files in powershell with ls -fo

Refer https://github.com/maksyche/pentest-everything/tree/master/enum_and_exploit/windows

Privileges, groups,etc

Or in powershell:

To check of a particular pipe:

Use mimikatz once Administrator access is gained. Multiple techniques are outlined in the Mimikatz page

SharpDPAPI

Common Vulnerabilities

Social Engineering

scf file:

Programs & Services

Remove "select displayname" to display all properties 32 bit:

64 bit:

Also check Program files directory and Downloads

Network

Files & Creds (PuTTY,Autologon,etc)

If stored credentials present can run commands as other users:

Last updated

Was this helpful?