Privilege Escalation
Windows Privilege Esclation
Checking token privileges
whoami /allwhoami /privTokens
Systeminfo
Finding exploits
PowerShell history
Find groups and users
Commands to do so
Privileged group?
Backup Operators group?
Unquoted service path
Installed software
Winlogon Credentials
Credentials to other account
BloodHound
BloodHound.py
SharpHound.exe
Automatic scan (winpeas)
Firefox credentials trough profiles
SQL server locally
Check is sqlcmd is available
Connecting to db using credentials
Listing files recursively (finding creds in files)
gMS accounts (gMSAs)
Listing Windows Defender Exclusions:
Exporting SAM and SYSTEM for hashes:
Disable Windows Defender
Last updated