15.Weak-permissions
whoami command to check current user information
whoami /userList members of the administrators group
net localgroup administratorsDisplay the privileges of the current user
whoami /privQuery registry to check if UAC is enabled
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUAQuery registry for administrator consent prompt behavior
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v ConsentPromptBehaviorAdminGet the OS version using PowerShell
[environment]::OSVersion.VersionPrint the PATH environment variable
cmd /c echo %PATH%List tasks and filter for rundll32 processes
# Useful to identify suspicious rundll32 usage
tasklist /svc | findstr "rundll32"Kill a process by specifying its PID
Generate a reverse TCP shell DLL using msfvenom
Start a Python HTTP server to host the DLL payload
Download the DLL file from the attacker's server using curl
Set up Netcat listener to capture the reverse shell
Execute the DLL payload using rundll32
Open advanced system properties dialog
Confirm the current user after potential privilege escalation
1. Permissive File System ACLs (SecurityService)
2. Weak Service Permissions (WindscribeService)
3. Unquoted Service Paths (SystemExplorerHelpService)
4. Permissive Registry ACLs (ModelManagerService)
5. Modifiable Registry Autorun Binary
Key Concepts:
Last updated