KARIM ASHRAF SPACE.
Ctrlk
  • Who Am I ?
  • WRITEUPS
    • What about Practice in Cyber Security?
    • Dark Side of VSCode
    • What about Cy-nix Machine?
    • Cyberdefenders Labs
    • Lets Defend
    • BTLO LABS
    • The Complete Active Directory Security Handbook
    • Windows Privilege Escalation
      • Tools
      • Windows Version and Configuration
      • User Enumeration
      • Network Enumeration
      • Antivirus Enumeration
      • Default Writeable Folders
      • EoP - Looting for passwords
      • EoP - Incorrect permissions in services
      • EoP - Windows Subsystem for Linux (WSL)
      • EoP - Unquoted Service Paths
      • EoP - $PATH Interception
      • EoP - Named Pipes
      • EoP - Kernel Exploitation
      • EoP - AlwaysInstallElevated
      • EoP - Insecure GUI apps
      • EoP - Evaluating Vulnerable Drivers
      • EoP - Printers
      • EoP - Runas
      • EoP - Abusing Shadow Copies
      • EoP - From local administrator to NT SYSTEM
      • EoP - Living Off The Land Binaries and Scripts
      • EoP - Impersonation Privileges
      • EoP - Privileged File Write
      • References
      • Practical Labs
    • Advanced Log Analysis
    • Methods for Stealing Password in Browser
  • The Ultimate Active Directory CheatSheet
  • COURSES SUMMARY
    • TCM SEC
    • The SecOps Group
    • Cybrary
  • TIPS&TRICKS
    • Windows Shorcuts Arrow Remover
    • Kali KEX
    • Intel TurboBoost
    • Pentest_Copilot
    • Ferdium
    • Youtube Adblock_Bybass
    • Burb-Bambdas
    • Burb Customizer
    • BetterFox
Powered by GitBook
On this page
  1. WRITEUPS

Windows Privilege Escalation

ToolsWindows Version and ConfigurationUser EnumerationNetwork EnumerationAntivirus EnumerationDefault Writeable FoldersEoP - Looting for passwordsEoP - Incorrect permissions in servicesEoP - Windows Subsystem for Linux (WSL)EoP - Unquoted Service PathsEoP - $PATH InterceptionEoP - Named PipesEoP - Kernel ExploitationEoP - AlwaysInstallElevatedEoP - Insecure GUI appsEoP - Evaluating Vulnerable DriversEoP - PrintersEoP - RunasEoP - Abusing Shadow CopiesEoP - From local administrator to NT SYSTEMEoP - Living Off The Land Binaries and ScriptsEoP - Impersonation PrivilegesEoP - Privileged File WriteReferencesPractical Labs
PreviousConclusion & ReferencesNextTools

Last updated 1 year ago