Local Privilege Escalation Techniques - Windows Edition
- UAC and bypass
- Access Token Manipulation
- Exposed credentials (Azure, PowerShell history,...)
- Missing patches
- Automated deployment and Autologon passwords in clear text
- AlwaysInstallElevated (Any User can run MSI as System)
- Misconfigured Services
- Unquoted path
- DLL Hijacking
Tools
- PowerUP
- BeRoot
- Privesc
PowerUp
Get services with unquoted paths and a space in their name
Get services where the currentuser can write to its binary path or change argument to the binary
Get the services whose configuration current user can modify
Open a reverse shell listening using powercat