Pentesting notes
CtrlK
  • 🏠/home/kabaneridev/.pt-notes
  • πŸ†Certification Preparation
    • βœ…CPTS - Completed
      • 🌐Infrastructure Enumeration
      • πŸ›‘οΈFirewall Evasion
      • πŸ”Vulnerability Assessment
      • πŸ“‚File Transfer Methods
      • 🐚Shells & Payloads
      • πŸ—„οΈDatabase Services
      • πŸ“Network Services
      • βš”οΈAttacking Common Services
      • πŸ”€Pivoting, Tunneling & Port Forwarding
      • 🏰Active Directory Enumeration & Attacks
      • πŸ–₯️Remote Management
      • πŸ•·οΈWeb Enumeration
      • 🌐Web Application Attacks
      • πŸ”Password Attacks & Lateral Movement
      • πŸͺŸWindows Privilege Escalation
        • πŸ“‹Module Overview
        • πŸ”Situational Awareness
        • πŸ“ŠInitial Enumeration
        • πŸ”„Communication with Processes
        • πŸ₯”SeImpersonate & SeAssignPrimaryToken
        • πŸ”SeDebugPrivilege
        • 🏠SeTakeOwnershipPrivilege
        • πŸ›οΈWindows Built-in Groups
        • πŸ“‹Event Log Readers
        • 🌐DnsAdmins
        • πŸ’»Hyper-V Administrators
        • πŸ–¨οΈPrint Operators
        • πŸ–₯️Server Operators
        • πŸ›‘οΈUAC Bypass
        • πŸ”Weak Permissions
        • πŸ’£Kernel Exploits
        • ⚑Vulnerable Services
        • πŸ”‘Credential Hunting
        • πŸ“Other Files
        • πŸ•΅οΈFurther Credential Theft
        • πŸšͺCitrix Breakout
        • πŸ‘₯Interacting with Users
        • 🎯Pillaging
        • πŸ”§Miscellaneous Techniques
        • πŸ–₯️Windows Server 2008
        • πŸ’»Windows 7 Exploitation
      • 🐧Linux Privilege Escalation
      • πŸ“‹Documentation & Reporting
      • 🌐Attacking Enterprise Networks
    • πŸ“˜CWEE Preparation
    • βœ…PJPT - Completed
  • πŸ”§Core Knowledge Areas
    • πŸ”Information Gathering
    • 🐧Linux Privilege Escalation
    • πŸͺŸWindows Privilege Escalation
    • πŸ› οΈTools & Utilities
Powered by GitBook
On this page
  1. πŸ†Certification Preparation
  2. βœ…CPTS - Completed

πŸͺŸWindows Privilege Escalation

πŸ“‹Module OverviewπŸ”Situational AwarenessπŸ“ŠInitial EnumerationπŸ”„Communication with ProcessesπŸ₯”SeImpersonate & SeAssignPrimaryTokenπŸ”SeDebugPrivilege🏠SeTakeOwnershipPrivilegeπŸ›οΈWindows Built-in GroupsπŸ“‹Event Log Readers🌐DnsAdminsπŸ’»Hyper-V AdministratorsπŸ–¨οΈPrint OperatorsπŸ–₯️Server OperatorsπŸ›‘οΈUAC BypassπŸ”Weak PermissionsπŸ’£Kernel Exploits⚑Vulnerable ServicesπŸ”‘Credential HuntingπŸ“Other FilesπŸ•΅οΈFurther Credential TheftπŸšͺCitrix BreakoutπŸ‘₯Interacting with Users🎯PillagingπŸ”§Miscellaneous TechniquesπŸ–₯️Windows Server 2008πŸ’»Windows 7 Exploitation
PreviousCracking Protected FilesNextModule Overview

Last updated 2 months ago