🔴
Hacking
Search...
Ctrl + K
5. Privesc and Post-explotation
Windows Privilege Escalation
Previous
Pillaging/Data Harvesting
Next
Enumeration Scripts
Last updated
2 years ago
Enumeration Scripts
Manual Enumeration
Metasploit tools
Processes Enumeration and Tasks
Incorrect permissions in services
Unquoted Service Paths
Insecure GUI Apps
Autorun
AlwaysInstallElevated
$PATH Interception
Looting for passwords
Runas
Impersonation Privileges
From local administrator to NT SYSTEM
Common Vulnerabilities and Exposure (CVE)
Kernel Exploitation
Named Pipes
Vulnerable Drivers
Abusing Shadow Copies