Windows Privilege Escalation
Windows Privilege Escalation
Purpose
Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that enable escalation from standard user to Administrator or SYSTEM privileges.
Inputs / Prerequisites
- Initial Access: Shell or RDP access as standard user on Windows system
- Enumeration Tools: WinPEAS, PowerUp, Seatbelt, or manual commands
- Exploit Binaries: Pre-compiled exploits or ability to transfer tools
- Knowledge: Understanding of Windows security model and privileges
- Authorization: Written permission for penetration testing activities
Outputs / Deliverables
- Privilege Escalation Path: Identified vector to higher privileges
- Credential Dump: Harvested passwords, hashes, or tokens
- Elevated Shell: Command execution as Administrator or SYSTEM
- Vulnerability Report: Documentation of misconfigurations and exploits
- Remediation Recommendations: Fixes for identified weaknesses
Core Workflow
🧠 Knowledge Modules (Fractal Skills)
1. 1. System Enumeration
2. 2. Credential Harvesting
3. 3. Service Exploitation
4. 4. Token Impersonation
5. 5. Kernel Exploitation
6. 6. Additional Techniques
7. Enumeration Tools
8. Default Writable Folders
9. Common Privilege Escalation Vectors
10. Impersonation Privilege Exploits
11. Operational Boundaries
12. Detection Considerations
13. Legal Requirements
14. Example 1: Service Binary Path Exploitation
15. Example 2: AlwaysInstallElevated Exploitation
16. Example 3: JuicyPotato Token Impersonation
17. Example 4: Unquoted Service Path
18. Example 5: Credential Harvesting from Registry
More from dokhacgiakhoa/antigravity-ide
ui-ux-pro-max-skill
Premium design and micro-interactions toolkit.
89notion-mcp
Official Notion Model Context Protocol Server for workspace interaction.
33filesystem-mcp
Official Filesystem Model Context Protocol Server for local file operations.
24puppeteer-mcp
Official Puppeteer Model Context Protocol Server for browser automation.
15postgres-mcp
Official PostgreSQL Model Context Protocol Server for database interaction.
14penetration-tester-master
Ultimate Offensive Security Master Skill.
13