Windows Privesc

Cards (8)

  • Initial Reconnaissance
    1. Identify your user and system details
    2. Explore user accounts and permissions
  • Network Intelligence
    1. Inspect network configurations
    2. Monitor active network connections
  • Identifying Vulnerabilities
    1. Discover services with loose permissions
    2. Investigate scheduled tasks
  • Leveraging WMIC for In-depth Analysis
    Gather info on processes and services
  • Exploitation
    1. Manipulate service executables or scripts
    2. Scheduled task hijacking
  • Advanced Escalation Techniques
    1. Modify registry for persistence
    2. Exploit writeable directories
  • Securing and Cleaning Up

    1. Create a backdoor account
    2. Erase activity logs
  • WMIC stands as a versatile tool in your arsenal, capable of extracting a wealth of information from the system