PRIMARY CATEGORY → CHECKLISTS   •   WINDOWS PRIVESC

Mindmap

Windows Privesc Mindmap

Zoom in


Non-Privileged

e.g. Network Interfaces, ARP Table, Routing Table…

e.g. HTTP ↔ 8000 TCP Port ( 127.0.0.1:8080 )

From LOCAL SERVICE or NETWORK SERVICE to LOCAL SYSTEM

   RoguePotatoRottenPotatoJuicyPotatoPrintSpoofer

e.g. seDebug, seBackup, seLoadDriver and so on

e.g. A local user account named Alex which belongs to Backup Operators

e.g. MRemoteNG

   SherlockWindows Exploit Suggester

   NetexecImpacket’s REG.pyGet-GPPAutologon

e.g. Resources containing juicy strings such as “pass|password|passwd” and so on

See also Other Interesting Files and Unattended Installation Files

e.g. Cookies, Saved Logins…

See DPAPI Abuse


Privileged

   Impacket’s Secretsdump.pyMimikatzNetexec

See DPAPI Abuse

   Impacket’s Secretsdump.py + ( Hashcat + John )

Credentials for all system users