Windows Privilege Escalation

Overview

Privilege escalation in Windows involves techniques to gain higher-level access, typically from a normal user to SYSTEM or Domain Admin privileges.

Kernel Exploits

1. System Information

# OS Version
systeminfo
Get-WmiObject -Class Win32_OperatingSystem

# Hotfixes
wmic qfe list
Get-HotFix

# Architecture
wmic os get osarchitecture
[Environment]::Is64BitOperatingSystem
# Manual Search
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
systeminfo | findstr /B /C:"Hotfix(s)"

# Automated Tools
.\windows-exploit-suggester.py --database 2021-03-23-mssb.xls --systeminfo systeminfo.txt
.\Sherlock.ps1 -Command "Find-AllVulns"

3. Exploit Execution

Service Exploitation

1. Service Enumeration

2. Service Misconfiguration

3. Service Manipulation

DLL Hijacking

1. DLL Search Order

2. DLL Injection

Scheduled Tasks

1. Task Enumeration

2. Task Creation

Registry Exploitation

1. Registry Enumeration

2. Registry Modification

Tools

1. Primary Tools

  • PowerUp

  • WinPEAS

  • Sherlock

  • Windows-Exploit-Suggester

  • Seatbelt

2. Additional Tools

  • PowerSploit

  • Empire

  • Covenant

  • Cobalt Strike

  • Sliver

Best Practices

1. Escalation Strategy

  • Start with low-risk techniques

  • Use multiple methods

  • Document findings

  • Test safely

  • Follow engagement scope

2. OPSEC Considerations

  • Use stealth techniques

  • Avoid detection

  • Monitor for alerts

  • Use legitimate tools

  • Follow engagement scope

Resources


Last Updated: 2025-03-23

Last updated

Was this helpful?