• OSCP - Useful Resources
  • Introduction
  • Information Gathering/Reconnaissance
  • Port Scanning
  • Backdoors/Web Shells
  • Local File Inclusion/Remote File Inclusion
  • Shell Spawning
  • Windows Privilege Escalation
  • Linux Privilege Escalation
  • Fuzzing Payloads
  • Metasploit
  • MSFVenom
  • File Transfer
  • Samba (SMB)
  • Windows Post-Exploitation
  • Linux Post-Exploitation
  • Pivoting
  • Buffer Overflows
  • Remote Desktop Protocol (RDP)
  • SQL Injection
  • Password Cracking
  • Pre-Exam Prep
  • Cross-Compilation
  • Jailed Shell Escape
  • General Notes
Powered by GitBook

Windows Privilege Escalation

Windows Privilege Escalation

  1. http://www.fuzzysecurity.com/tutorials/16.html
  2. https://toshellandback.com/2015/11/24/ms-priv-esc/
  3. https://github.com/pentestmonkey/windows-privesc-check
  4. https://blog.gdssecurity.com/labs/2014/7/11/introducing-windows-exploit-suggester.html
  5. https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
  6. https://github.com/foxglovesec/RottenPotato
  7. http://www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet/
  8. https://www.youtube.com/watch?v=PC_iMqiuIRQ
  9. https://www.youtube.com/watch?v=kMG8IsCohHA&feature=youtu.be
  10. https://github.com/PowerShellMafia/PowerSploit
  11. http://www.blackhillsinfosec.com/?p=5824
  12. https://www.commonexploits.com/unquoted-service-paths/
  13. https://github.com/abatchy17/WindowsExploits

results matching ""

    No results matching ""