Checklist - Local Windows Privilege Escalation

{{#include ../banners/hacktricks-training.md}}

Best tool to look for Windows local privilege escalation vectors: WinPEAS

System Info

Logging/AV enumeration

Network

  • [ ] Check current network information
  • [ ] Check hidden local services restricted to the outside

Running Processes

Services

Applications

DLL Hijacking

  • [ ] Can you write in any folder inside PATH?
  • [ ] Is there any known service binary that tries to load any non-existant DLL?
  • [ ] Can you write in any binaries folder?

Network

  • [ ] Enumerate the network (shares, interfaces, routes, neighbours, ...)
  • [ ] Take a special look at network services listening on localhost (127.0.0.1)

Windows Credentials

Files and Registry (Credentials)

Leaked Handlers

  • [ ] Have you access to any handler of a process run by administrator?

Pipe Client Impersonation

  • [ ] Check if you can abuse it

References

{{#include ../banners/hacktricks-training.md}}