windows-privilege-escalation
Windows Shell
Basic Windows Commands
Basic Windows Commands – 2
Managing File and Folder Permissions in Windows
Understanding the ACL Entries
Windows Booting Files
net user
Net Services Suite
Service Controller Utility Commands
Windows Firewall Management
Windows Registry Commands
User and Network Enumeration
Windows Kernel Exploits
MS14-058 – ‘TrackPopupMenu’ Local Privilege Escalation
Windows Certificate Dialog Elevation of Privilege Vulnerability (CVE-2019-1388)
Generating Hash Files from SAM and SYSTEM
Active Directory Domain – NTDS.DIT
FileZilla Server Password Recovery
Password in Windows Registry
PowerShell Command History
Impersonation and Potato Attacks
Juicy Potato
GodPotato Exploit
Dynamic Link Library Hijacking (DLL Hijacking)
Unquoted Service Path Vulnerability
Insecure Service Permissions (binPath)
AlwaysInstallElevated Exploitation
AlwaysInstallElevated Exploitation – 2
Autorun – Registry Persistence
UAC Bypass
Cmdkey and Runas Command
WinPEAS
Last updated