Windows Privesc
Privilege Escalation
Find Commands
# Find flag
Get-ChildItem -Path C:\ -Recurse -Include "proof.txt", "local.txt" -Force 2>$null
dir /s/b local.txt
dir C:\local.txt /s /b 2>nul
dir C:\proof.txt /s /b 2>nul
# Files
tree /f /a
tree /s/b *.log
dir /s/b john\*.txtPotato Attacks
Identify
# Identify privileges & privileges that may be of interest
whoami /priv
SeImpersonatePrivilege, SeBackupPrivilege, SeAssignPrimaryToken, SeLoadDriver, SeDebug
# SeRemoteShutdownPrivilege, SeShutdownPrivilege (local only). To shutdown
shutdown /r /m \\target -t 0 /f or shutdown -r -t 1
# Check for security patches
systeminfo
Get-CimInstance -Class win32_quickfixengineering | Where-Object { $_.Description -eq "Security Update" }
Locate the CVE, check if it's patched.GodPotato
JuicyPotato
SigmaPotato
PrintSpoofer
AlwaysInstallElevated
RunAs
Unquoted Service Paths
Service Binary Path
WSL
Last updated
