skills/dokhacgiakhoa/antigravity-ide/Privilege Escalation Methods

Privilege Escalation Methods

SKILL.md

Privilege Escalation Methods

Purpose

Provide comprehensive techniques for escalating privileges from a low-privileged user to root/administrator access on compromised Linux and Windows systems. Essential for penetration testing post-exploitation phase and red team operations.

Inputs/Prerequisites

  • Initial low-privilege shell access on target system
  • Kali Linux or penetration testing distribution
  • Tools: Mimikatz, PowerView, PowerUpSQL, Responder, Impacket, Rubeus
  • Understanding of Windows/Linux privilege models
  • For AD attacks: Domain user credentials and network access to DC

Outputs/Deliverables

  • Root or Administrator shell access
  • Extracted credentials and hashes
  • Persistent access mechanisms
  • Domain compromise (for AD environments)

Core Techniques

🧠 Knowledge Modules (Fractal Skills)

1. Linux Privilege Escalation

2. Windows Privilege Escalation

3. Active Directory Attacks

4. Credential Harvesting

5. Example 1: Linux Sudo to Root

6. Example 2: Windows Kerberoasting

Weekly Installs
0
GitHub Stars
384
First Seen
Jan 1, 1970