Save
check
Windows Privesc
Save
Share
Learn
Content
Leaderboard
Learn
Created by
duinbos straat
Visit profile
Cards (8)
Initial Reconnaissance
1. Identify your user and system details
2. Explore user accounts and
permissions
Network Intelligence
1. Inspect
network configurations
2. Monitor
active
network connections
Identifying Vulnerabilities
1. Discover services with
loose permissions
2. Investigate
scheduled tasks
Leveraging WMIC for In-depth Analysis
Gather info
on processes and services
Exploitation
1. Manipulate service executables or scripts
2. Scheduled task
hijacking
Advanced Escalation Techniques
1. Modify registry for
persistence
2.
Exploit writeable
directories
Securing
and
Cleaning
Up
1. Create a
backdoor
account
2. Erase
activity
logs
WMIC stands as a versatile tool in your
arsenal
, capable of extracting a
wealth of information from the system