Local Privilege Escalation
A page which sums up ways to elevate privileges locally on Windows machines as I gradually discover new ones
Access Tokens vectors
Everytime a user logs in into our Windows system, it is granted an access token for this logon session. And everytime a process is executed on behalf on this user, a copy of said token is assigned to it. The token identifies the user, its groups, and its privileges. It also contains a Security Identifier (SID) that is used to identify the current logon session.
All of the aforementionned information can be consulted via a simple whoami /all ;
Local Admin
Services vectors
Service related commands
net start
wmic service list brief
sc query
Get-ServiceCheck service permissions
sc qc [name of the service]Unquoted Service Path
List all unquoted service paths via powershell :
LOLBAS
LOLBAS (short for Living Off the Land Binary And Scripts) are a collection of 135+ binaries and script that be can be abused by an attacker in a Windows environment during the post-exploitation phase : https://lolbas-project.github.io/#
Last updated
Was this helpful?