windows-privilege-escalation
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides commands to modify system services to execute arbitrary binaries with elevated privileges, such as using
sc configto redirect service binary paths to reverse shell payloads. It also provides instructions for executing exploit binaries likeJuicyPotato.exeandPrintSpoofer.exe.- [CREDENTIALS_UNSAFE]: Includes methodologies for harvesting sensitive credentials from system files such as the SAM and SYSTEM hives, as well as searching the registry and file system for plaintext passwords and WiFi security keys.- [EXTERNAL_DOWNLOADS]: References numerous third-party security tools and exploit scripts, including WinPEAS, Seatbelt, Watson, and Sherlock.ps1, which are not hosted within trusted organizations.- [REMOTE_CODE_EXECUTION]: Demonstrates how to generate and execute malicious MSI packages viamsfvenomto establish reverse shells with system-level privileges.- [DATA_EXFILTRATION]: Provides the means to capture and extract sensitive information such as password hashes and session data, often using network-capable utilities like Netcat.- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it ingests and processes untrusted data from system commands. - Ingestion points: Outputs from commands like
systeminfo,wmic,net user, andicacls. - Boundary markers: None identified; system command outputs are interpolated directly into the context.
- Capability inventory: High-impact capabilities including service modification, credential access, and exploit execution.
- Sanitization: No evidence of sanitization or validation of data ingested from the target system environment.
Audit Metadata