Privilege Escalation Methods
SKILL.md
Privilege Escalation Methods
Purpose
Provide comprehensive techniques for escalating privileges from a low-privileged user to root/administrator access on compromised Linux and Windows systems. Essential for penetration testing post-exploitation phase and red team operations.
Inputs/Prerequisites
- Initial low-privilege shell access on target system
- Kali Linux or penetration testing distribution
- Tools: Mimikatz, PowerView, PowerUpSQL, Responder, Impacket, Rubeus
- Understanding of Windows/Linux privilege models
- For AD attacks: Domain user credentials and network access to DC
Outputs/Deliverables
- Root or Administrator shell access
- Extracted credentials and hashes
- Persistent access mechanisms
- Domain compromise (for AD environments)
Core Techniques
🧠Knowledge Modules (Fractal Skills)
1. Linux Privilege Escalation
2. Windows Privilege Escalation
3. Active Directory Attacks
4. Credential Harvesting
5. Example 1: Linux Sudo to Root
6. Example 2: Windows Kerberoasting
Weekly Installs
0
Repository
dokhacgiakhoa/a…vity-ideGitHub Stars
384
First Seen
Jan 1, 1970
Security Audits