The Hacker Recipes
CtrlK
GitHubTwitterExegolTools
  • Introduction
  • Active Directory
    • Reconnaissance
    • Movement
    • Persistence
  • Web services
    • Reconnaissance
    • Configuration
    • Accounts and sessions
    • User inputs
  • Systems & services
    • Reconnaissance
    • Initial access (protocols)
    • Initial access (phishing)
    • Privilege escalation
      • Windows
        • 🛠️Credential dumping
        • 🛠️Unquoted path
        • 🛠️Scheduled tasks
        • 🛠️Weak service permissions
        • 🛠️Vulnerable drivers
        • 🛠️Account privileges
        • 🛠️Kernel exploitation
        • 🛠️Windows Subsystem for Linux
        • 🛠️Runas saved creds
        • Unattend files
        • 🛠️Network secrets
        • 🛠️Living off the land
      • UNIX-like
    • Pivoting
  • Evasion
    • (AV) Anti-Virus
    • 🛠️(EDR) Endpoint Detection and Response
  • 🛠️Physical
    • Locks
    • Networking
    • Machines
    • Super secret zones
  • 🛠️Intelligence gathering
    • CYBINT
    • OSINT
    • GEOINT
  • 🛠️RADIO
    • RFID
    • Bluetooth
    • Wi-Fi
    • Wireless keyboard/mouse
  • 🛠️mobile apps
    • Android
    • iOS
Powered by GitBook
On this page

Was this helpful?

  1. Systems & services
  2. Privilege escalation
  3. Windows

🛠️Account privileges

https://twitter.com/fr0gger_/status/1379465943965909000/photo/1

PreviousVulnerable driversNextKernel exploitation

Last updated 3 years ago

Was this helpful?