windows-privilege-escalation

background shell

START /B FILE
Start-Process -NoNewWindow -FilePath FILE -ArgumentList "ARGS" [-Credential $creds]

Create User

# add new user
net user kashz iamR00t123! /add
net localgroup administrators kashz /add
net localgroup "Remote Management Users" kashz /add

DLL hijacking

NOTE: needs RDP-access

# required library files which could be missing; specified with relative paths; absolute paths which could be writable.
> Run Procmon64.exe; filter to service in question; deselect registry activity and network activity
> net start <service>
# see which DLL files are missing and exploit

RunAs | Creds reuse using PS

Decrypt PSCredential

Reference

Last updated

Was this helpful?