Windows Privilege Escalation
Overview
Kernel Exploits
1. System Information
# OS Version
systeminfo
Get-WmiObject -Class Win32_OperatingSystem
# Hotfixes
wmic qfe list
Get-HotFix
# Architecture
wmic os get osarchitecture
[Environment]::Is64BitOperatingSystem2. Exploit Search
# Manual Search
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
systeminfo | findstr /B /C:"Hotfix(s)"
# Automated Tools
.\windows-exploit-suggester.py --database 2021-03-23-mssb.xls --systeminfo systeminfo.txt
.\Sherlock.ps1 -Command "Find-AllVulns"3. Exploit Execution
Service Exploitation
1. Service Enumeration
2. Service Misconfiguration
3. Service Manipulation
DLL Hijacking
1. DLL Search Order
2. DLL Injection
Scheduled Tasks
1. Task Enumeration
2. Task Creation
Registry Exploitation
1. Registry Enumeration
2. Registry Modification
Tools
1. Primary Tools
2. Additional Tools
Best Practices
1. Escalation Strategy
2. OPSEC Considerations
Resources
Last updated