📄️ 01-Manual Windows Enumeartion
Performing enumeration for the privilege escalation using native windows features and commands.
📄️ 02-Service Binary Hijacking
Hijacking the service binarys of the windows machines to escalate our privileges.
📄️ 03-DLL Hijacking
Hijacking Windows DLL's
📄️ 04-Unquoted Service Paths
---
📄️ 05-Scheduled Tasks
📄️ 05-Windows-Kernel-exploit
Performing enumeration for the privilege escalation using native windows features and commands.
📄️ 06-Passing NTLM Hash
After you get NTLM hashes of any user if cracking of password is not feasible could be due to complexity of the password this method can be used to pass the NTLM hash to access resources in windows.
📄️ 07-NTLMv2 Relay
After you get NTLM hashes of any user if cracking of password is not feasible could be due to complexity of the password this method can be used to pass the NTLM hash to access resources in windows.
📄️ 04-Automated Windows Enumeartion
We can also automate the enumeration for the privilege escalation by using some tools as given below
📄️ Miscellaneous
A collection of useful Windows and Kali Linux tricks including file transfer techniques, cross-compilation of C programs for Windows, and various command-line methods to assist in post-exploitation and red teaming tasks.