Privilege Escalation Checklist

This checklist helps you avoid rabbit holes by systematically verifying prerequisites for various privilege escalation techniques. Before spending time on a potential vector, check if the necessary conditions are met.

Initial Enumeration Checklist

Privilege Abuse Prerequisites

Token Privileges

Service Exploitation Prerequisites

Registry Exploits Prerequisites

Credential Hunting Prerequisites

Kernel Exploits Prerequisites

Misconfiguration Prerequisites

Software-Specific Exploits

Avoiding Common Rabbit Holes

  1. Don't waste time on kernel exploits first

    • They're riskier and can crash the system

    • Exhaust other methods before attempting these

    • Verify the exact OS version and patches before attempting

  2. Don't try exploits without checking prerequisites

    • Verify all checklist items before investing time in an exploit

    • Test exploits in a similar environment if possible

  3. Don't ignore the "low-hanging fruit"

    • Always check basic misconfigurations first

    • Look for stored credentials before complex exploits

    • Check user privileges immediately (whoami /priv)

  4. Don't forget to document attempts

    • Keep track of what you've tried

    • Note partial successes for later combination attacks

    • Document why certain approaches failed

Time Management Tips

  1. Set a time limit for each potential vector (15-30 minutes)

  2. If a technique is taking too long, move on and come back later

  3. Prioritize techniques based on:

    • Reliability (less likely to crash the system)

    • Simplicity (fewer steps means fewer potential failures)

    • Prerequisites you've already confirmed

Remember: The goal is to find the easiest path to privilege escalation, not to try every possible technique.

Last updated