20.Privileged Access
Windows (PowerShell)
Enumerate RDP and WinRM Users:
Establish a Secure WinRM Session:
To exit the session:
PowerUpSQL for SQL Server Enumeration:
Execute SQL Query:
Linux-Based Enumeration
Install and Use Evil-WinRM:
MSSQLClient for SQL Enumeration:
BloodHound (Cypher Queries)
Find WinRM Access:
Find SQL Admin Access:
Best Practices & Mitigations
Restrict Privileged Access: Limit RDP and WinRM access to necessary personnel.
Monitor Privileged Actions: Enable auditing for RDP logins and PowerShell execution logs.
SQL Security: Disable xp_cmdshell and enforce strong authentication mechanisms.
Least Privilege Principle: Regularly audit and limit high-privilege group memberships.
Use MFA and Network Segmentation: Add extra security layers to critical services.
By implementing these best practices, organizations can significantly reduce the risk of privilege escalation attacks.
Last updated