Pentest Notes
search
โŒ˜Ctrlk
Pentest Notes
  • ๐Ÿ /home/x3m1Sec/.pt-notes
  • ๐Ÿ“Pentest Notes
  • ๐ŸŽฎCTFs
  • ๐ŸŽ“Road to certification
    • eJPTv2
    • CPTS
      • My review
      • Notes
        • Enumeration
        • Nmap
        • Attacking Common Applications
        • Attacking Common Services
        • Active Directory Enumeration & Attacks
        • Linux Privilege Escalation
        • Windows Privilege Escalation
          • Priv-Esc
          • 1.Getting the Lay of the Land
          • 2.Windows User Privileges
          • 3.Windows Group Privileges
          • 4.Attacking the OS
          • 5.Credential Theft
          • 6.Restricted Environments
          • 7.Additional Techniques
          • 8.Dealing with End of Life Systems
        • Server-side Attacks
        • Web Attacks
        • Web Service & API Attacks
        • Command-injections
        • SQL-injection
        • XSS
        • Broken Authentication
        • Login-brute-forcing
        • Password-attacks
        • Password-cracking
        • Session Security Guide
        • File-transfer
        • File-upload-attacks
        • Shells and payloads
        • Upgrading-tty-shell
        • Using-the-metasploit-framework
        • File Inclusion
        • Ligolo-ng
        • Pivoting-tunneling-and-port-forwarding
        • TIPS
        • CheatSheet
    • OSCP
  • ๐Ÿ“šResources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ๐ŸŽ“Road to certificationchevron-right
  2. CPTSchevron-right
  3. Notes

Windows Privilege Escalation

Priv-Escchevron-right1.Getting the Lay of the Landchevron-right2.Windows User Privilegeschevron-right3.Windows Group Privilegeschevron-right4.Attacking the OSchevron-right5.Credential Theftchevron-right6.Restricted Environmentschevron-right7.Additional Techniqueschevron-right8.Dealing with End of Life Systemschevron-right
Previous25.Netfilterchevron-leftNextPriv-Escchevron-right

Last updated 8 months ago