📄️ 01-Manual Windows Enumeartion
Performing enumeration for the privilege escalation using native windows features and commands.
📄️ 02-Service Binary Hijacking
Hijacking the service binarys of the windows machines to escalate our privileges.
📄️ 03-DLL Hijacking
Hijacking Windows DLL's
📄️ 04-Unquoted Service Paths
Performing enumeration for the privilege escalation using native windows features and commands.
📄️ 05-Windows-Kernel-exploit
Performing enumeration for the privilege escalation using native windows features and commands.
📄️ 06-Passing NTLM Hash
After you get NTLM hashes of any user if cracking of password is not feasible could be due to complexity of the password this method can be used to pass the NTLM hash to access resources in windows.
📄️ 07-NTLMv2 Relay
After you get NTLM hashes of any user if cracking of password is not feasible could be due to complexity of the password this method can be used to pass the NTLM hash to access resources in windows.
📄️ 04-Automated Windows Enumeartion
We can also automate the enumeration for the privilege escalation by using some tools as given below
📄️ Miscellaneous
A collection of nifty tricks and hacks to make your Windows pentesting smarter, faster, and stealthier.
📄️ Active Directory Hardening
This is the document to provide information on windows privilege escalation