Windows Privilege Escalation
Windows Privilege Escalation
Automated Enumeration
# WinPEAS
winPEASx64.exe / winPEAS.bat
# PowerUp (PowerShell)
Invoke-AllChecks
# Seatbelt
Seatbelt.exe allInitial Recon
whoami
whoami /groups
whoami /priv
hostname
systeminfo
ver
env
net users
net localgroup
net user <username>
query user
tasklist
ipconfig /allCredential Hunting
Token Abuse and Sudo-like Privileges
Services, Scheduled Tasks, and Misconfigs
AlwaysInstallElevated
DLL Hijacking and Search Order Abuse
UAC Bypass Techniques
Registry and Image File Execution Options (IFEO)
Sticky Keys Backdoor
Kernel Exploits
WMI and Logon Script Abuse
Startup Folders and Run Keys
PowerShell History and Console Logs
File and Folder Permissions
Last updated