Orodha ya ukaguzi - Local Windows Privilege Escalation

Tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks

Chombo bora cha kutafuta Windows local privilege escalation vectors: WinPEAS

System Info

Logging/AV enumeration

Network

  • Angalia current network information
  • Angalia huduma za ndani zilizofichwa zinazofikiwa kutoka nje

Running Processes

Services

Applications

DLL Hijacking

  • Je, unaweza kuandika katika folda yoyote ndani ya PATH?
  • Je, kuna binary ya service inayojulikana ambayo inajaribu kupakia any non-existant DLL?
  • Je, unaweza kuandika katika folda yoyote ya binaries?

Network

  • Tambua mtandao (shares, interfaces, routes, neighbours, …)
  • Angalia kwa makini huduma za mtandao zinazosikiliza kwa localhost (127.0.0.1)

Windows Credentials

Files and Registry (Credentials)

Leaked Handlers

  • Je, una ufikiaji wa handler yoyote wa mchakato unaoendeshwa na administrator?

Pipe Client Impersonation

  • Angalia kama unaweza kuitumia kwa matumizi mabaya

Tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks