Local Privilege Escalation

A page which sums up ways to elevate privileges locally on Windows machines as I gradually discover new ones

Access Tokens vectors

Everytime a user logs in into our Windows system, it is granted an access token for this logon session. And everytime a process is executed on behalf on this user, a copy of said token is assigned to it. The token identifies the user, its groups, and its privileges. It also contains a Security Identifier (SID) that is used to identify the current logon session.

All of the aforementionned information can be consulted via a simple whoami /all ;

Local Admin

Services vectors

net start
wmic service list brief
sc query
Get-Service

Check service permissions

sc qc [name of the service]

Unquoted Service Path

List all unquoted service paths via powershell :

LOLBAS

LOLBAS (short for Living Off the Land Binary And Scripts) are a collection of 135+ binaries and script that be can be abused by an attacker in a Windows environment during the post-exploitation phase : https://lolbas-project.github.io/#

Last updated

Was this helpful?