The Hacker Recipes
Ctrlk
GitHubTwitterExegolTools
  • Introduction
  • Active Directory
    • Reconnaissance
    • Movement
    • Persistence
  • Web services
    • Reconnaissance
    • Configuration
    • Accounts and sessions
    • User inputs
  • Systems & services
    • Reconnaissance
    • Initial access (protocols)
    • Initial access (phishing)
    • Privilege escalation
      • Windows
        • ๐Ÿ› ๏ธCredential dumping
        • ๐Ÿ› ๏ธUnquoted path
        • ๐Ÿ› ๏ธScheduled tasks
        • ๐Ÿ› ๏ธWeak service permissions
        • ๐Ÿ› ๏ธVulnerable drivers
        • ๐Ÿ› ๏ธAccount privileges
        • ๐Ÿ› ๏ธKernel exploitation
        • ๐Ÿ› ๏ธWindows Subsystem for Linux
        • ๐Ÿ› ๏ธRunas saved creds
        • Unattend files
        • ๐Ÿ› ๏ธNetwork secrets
        • ๐Ÿ› ๏ธLiving off the land
      • UNIX-like
    • Pivoting
  • Evasion
    • (AV) Anti-Virus
    • ๐Ÿ› ๏ธ(EDR) Endpoint Detection and Response
  • ๐Ÿ› ๏ธPhysical
    • Locks
    • Networking
    • Machines
    • Super secret zones
  • ๐Ÿ› ๏ธIntelligence gathering
    • CYBINT
    • OSINT
    • GEOINT
  • ๐Ÿ› ๏ธRADIO
    • RFID
    • Bluetooth
    • Wi-Fi
    • Wireless keyboard/mouse
  • ๐Ÿ› ๏ธmobile apps
    • Android
    • iOS
Powered by GitBook
On this page
  1. Systems & services
  2. Privilege escalation
  3. Windows

๐Ÿ› ๏ธAccount privileges

https://twitter.com/fr0gger_/status/1379465943965909000/photo/1

PreviousVulnerable driversNextKernel exploitation

Last updated 4 years ago

Was this helpful?

Was this helpful?