This checklist helps you avoid rabbit holes by systematically verifying prerequisites for various privilege escalation techniques. Before spending time on a potential vector, check if the necessary conditions are met.
Initial Enumeration Checklist
Privilege Abuse Prerequisites
Token Privileges
Service Exploitation Prerequisites
Registry Exploits Prerequisites
Credential Hunting Prerequisites
Kernel Exploits Prerequisites
Misconfiguration Prerequisites
Software-Specific Exploits
Avoiding Common Rabbit Holes
Don't waste time on kernel exploits first
They're riskier and can crash the system
Exhaust other methods before attempting these
Verify the exact OS version and patches before attempting
Don't try exploits without checking prerequisites
Verify all checklist items before investing time in an exploit
Test exploits in a similar environment if possible
Don't ignore the "low-hanging fruit"
Always check basic misconfigurations first
Look for stored credentials before complex exploits
Check user privileges immediately (whoami /priv)
Don't forget to document attempts
Keep track of what you've tried
Note partial successes for later combination attacks
Document why certain approaches failed
Time Management Tips
Set a time limit for each potential vector (15-30 minutes)
If a technique is taking too long, move on and come back later
Prioritize techniques based on:
Reliability (less likely to crash the system)
Simplicity (fewer steps means fewer potential failures)
Prerequisites you've already confirmed
Remember: The goal is to find the easiest path to privilege escalation, not to try every possible technique.