Windows Privilege Escalation
Windows Privilege Escalation
Purpose
Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems during penetration testing engagements. This skill covers system enumeration, credential harvesting, service exploitation, token impersonation, kernel exploits, and various misconfigurations that enable escalation from standard user to Administrator or SYSTEM privileges.
Inputs / Prerequisites
- Initial Access: Shell or RDP access as standard user on Windows system
- Enumeration Tools: WinPEAS, PowerUp, Seatbelt, or manual commands
- Exploit Binaries: Pre-compiled exploits or ability to transfer tools
- Knowledge: Understanding of Windows security model and privileges
- Authorization: Written permission for penetration testing activities
Outputs / Deliverables
- Privilege Escalation Path: Identified vector to higher privileges
- Credential Dump: Harvested passwords, hashes, or tokens
- Elevated Shell: Command execution as Administrator or SYSTEM
More from hainamchung/agent-assistant
spring-boot-engineer
Use when building Spring Boot 3.x applications, microservices, or reactive Java applications. Invoke for Spring Data JPA, Spring Security 6, WebFlux, Spring Cloud integration.
17embedded-systems
Use when developing firmware for microcontrollers, implementing RTOS applications, or optimizing power consumption. Invoke for STM32, ESP32, FreeRTOS, bare-metal, power optimization, real-time systems.
13expo-app-design
Build beautiful cross-platform mobile apps with Expo Router, NativeWind, and React Native.
13vulnerability-scanner
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
12copywriting
>
11cpp-pro
Write idiomatic C++ code with modern features, RAII, smart pointers, and STL algorithms. Handles templates, move semantics, and performance optimization.
11