Windows Privesc checklist
You have a shell on a Windows Device, now what?
DOMAIN ENUM (if joined)
Who are we? What can we do? Initial Enumeration
WHOAMI?
PRIVILEGES?
SYSTEM INFO
SERVICES
ADMIN CHECK
NETWORK
USERS
FIREWALL
SCHEDULED TASKS
INSTALLATION RIGHTS
PRIVESC CHECKLIST
UNQUOTED SERVICE PATHS
WEAK SERVICE PERMISSIONS
FILE TRANSFER OPTIONS
CLEAR TEXT CREDENTIALS
WEAK FILE PERMISSIONS
NEW ADMIN USER (Local/Domain)
SCHEDULED TASK ABUSE
ENUM
CREATE SYSTEM TASK
RUN TASK
POST EXPLOIT ENUMERATION
NETWORK USERS
NT AUTHORITY CHECKS
HASH DUMP
EXFILTRATE ntds.dit
INSTALLER ABUSE
SHARE ENUMERATION
WINDOWS PRIV ESC: GITHUB EXPLOITS
| Privilege Name | GitHub PoC |
|---|---|
| SeDebugPrivilege | github.com/bruno-1337/SeDebugPrivilege- |
| SeImpersonatePrivilege | github.com/itm4n/PrintSpoofer |
| SeAssignPrimaryToken | github.com/b4rdia/HackTricks |
| SeTcbPrivilege | github.com/hatRiot/token-priv |
| SeCreateTokenPrivilege | github.com/hatRiot/token-priv |
| SeLoadDriverPrivilege | github.com/k4sth4/SeLoadDriverPrivilege |
| SeTakeOwnershipPrivilege | github.com/hatRiot/token-priv |
| SeRestorePrivilege | github.com/xct/SeRestoreAbuse |
| SeBackupPrivilege | github.com/k4sth4/SeBackupPrivilege |
| SeIncreaseQuotaPrivilege | github.com/b4rdia/HackTricks |
| SeSystemEnvironment | github.com/b4rdia/HackTricks |
| SeMachineAccount | github.com/b4rdia/HackTricks |
| SeTrustedCredManAccess | learn.microsoft.com/…trusted-caller |
| SeRelabelPrivilege | github.com/decoder-it/RelabelAbuse |
| SeManageVolumePrivilege | github.com/CsEnox/SeManageVolumeExploit |
| SeCreateGlobalPrivilege | github.com/b4rdia/HackTricks |
Notes:
- PrintSpoofer is gold for SeImpersonatePrivilege.
- SeManageVolume has practical field PoCs.
MAINTAINING ACCESS
METERPRETER REVERSE SHELL SETUP
PERSISTENCE
PORT FORWARDING
SYSTEM MIGRATION
EXECUTE PAYLOADS
RESOURCES
Windows Exploit Suggester (kind of old)
https://github.com/AonCyberLabs/Windows-Exploit-Suggester
Windows privesc checker (contemporary)
https://github.com/itm4n/PrivescCheck
Cross Compile Payloads (Linux > Windows)
x86:
x64:
Additional Reading
https://www.fuzzysecurity.com/tutorials/16.html
https://book.hacktricks.xyz/windows/windows-local-privilege-escalation