Skip to content

Ignitetechnologies/Windows-Privilege-Escalation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

26 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸͺŸ Windows Privilege Escalation

A practical Windows Privilege Escalation cheat sheet and reference guide designed for penetration testers, red teamers, and cybersecurity learners to understand how attackers escalate privileges on Windows systems during post-exploitation.

🌐 Connect With Us

πŸ”΅ Telegram – Join Channel
⚫ Twitter/X – Follow Us
🟣 Discord – Join Server
πŸ’Ό LinkedIn – Follow HackingArticles

πŸŽ“ Training Program

πŸš€ Join Our Cybersecurity Training Program

Hands-on training in Penetration Testing, Red Teaming, and Cybersecurity.

image

πŸͺŸ Windows Privilege Escalation Techniques

# Topic Description Article
1 βš™οΈ AlwaysInstallElevated Abuse MSI installer policy to execute payloads with SYSTEM privileges Read Article
2 πŸ’Ύ SeBackupPrivilege Abuse backup privileges to read sensitive system files like SAM and NTDS Read Article
3 🌐 DnsAdmins to DomainAdmin Escalate privileges from DNSAdmins group to Domain Admin Read Article
4 🎭 SeImpersonatePrivilege Exploit token impersonation privileges for privilege escalation Read Article
5 🧨 HiveNightmare Exploit vulnerable permissions on registry hives to dump credentials Read Article
6 πŸ”‘ Registry Run Keys Abuse autostart registry keys to gain persistence and escalate privileges Read Article
7 πŸš€ Startup Folder Execute malicious programs via Windows startup folder Read Article
8 πŸ”“ Stored Credentials (Runas) Abuse saved credentials with runas command Read Article
9 πŸ—‚οΈ Weak Registry Permissions Exploit writable registry keys to escalate privileges Read Article
10 πŸ› οΈ Unquoted Service Path Exploit improperly quoted service paths to execute malicious binaries Read Article
11 πŸ–₯️ Insecure GUI Application Exploit GUI applications running with elevated privileges Read Article
12 πŸ”§ Weak Service Permissions Abuse misconfigured Windows services for privilege escalation Read Article
13 ⏰ Scheduled Task / Job Exploit scheduled tasks with weak permissions to execute payloads Read Article
14 🧬 Kernel Exploit Escalate privileges by exploiting vulnerable Windows kernel drivers Read Article
15 🧾 SamAccountSpoofing (CVE-2021-42278) Exploit Active Directory vulnerability to escalate privileges Read Article
16 πŸ–¨οΈ SpoolFool Exploit Windows Print Spooler vulnerabilities for privilege escalation Read Article
17 πŸ–¨οΈ PrintNightmare Exploit Print Spooler vulnerability to gain SYSTEM privileges Read Article
18 πŸ§‘β€πŸ’» Server Operator Group Abuse Server Operators group privileges to escalate access Read Article

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages