Monstersec Blog
LinkedinTwitter
  • Monstersec Blog
  • Adversary Experience
    • Undetectable Phishing setup
    • How to Root any Android phone In A Just Few Hours
    • Red Team Plot
      • Red Team Simulation
      • AD Enumeration
        • Powerview
      • Initial Access
      • Defense Evasion
      • Local Privilege Escalation
      • Credential Access
      • Lateral Movement
      • Local Persistence
      • Domain Privilege Escalation
      • Domain Persistence
      • Beyond Domain Admin
      • AD Certificate Service Attacks
      • Red Team Reference
    • Detection - Blue Team
    • Ransomware Plot
      • Ransomware TTPs
      • Ransomware Analysis
    • Pentesting Plot
      • Mobile Pentesting
      • Network Pentesting
      • API Pentesting
      • Web Pentesting
    • OSINT Plot
    • Cloud Security Plot
      • Azure
      • AWS
      • GCP
    • Attack Surface Management Plot
      • Asset Inventory
      • Asset Analysis
      • Vulnerability Finding
      • Risk Prioritization
    • DDoS Simulation
      • Layer 3
      • Layer 4
      • Layer 7
      • DDOS Bot
    • Automation
    • Cyber Security - Interview Questions
      • Basic Computer Science
      • Offensive Security
        • Pentesting
          • Network
          • Mobile
          • web
        • Red Teaming
        • Cloud Security
Powered by GitBook
On this page

Was this helpful?

  1. Adversary Experience
  2. Red Team Plot

Local Privilege Escalation

Windows - https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS

Linux - https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS

Way to escalate the privilege

  1. AlwaysInstallElevated

  2. SeBackupPrivilege

  3. DnsAdmins to DomainAdmin

  4. SeImpersonatePrivilege

  5. HiveNightmare

  6. Logon Autostart Execution (Registry Run Keys)

  7. Boot Logon Autostart Execution (Startup Folder)

  8. Stored Credentials (Runas)

  9. Weak Registry Permission

  10. Unquoted Service Path

  11. Insecure GUI Application

  12. Weak Service Permissions

  13. Scheduled Task/Job (T1573.005)

  14. Kernel Exploit

  15. SamAccountSpoofing (CVE-2021–42278)

  16. SpoolFool

  17. PrintNightmare

  18. Server Operator Group

PreviousDefense EvasionNextCredential Access

Last updated 2 years ago

Was this helpful?