Windows Privesc

Privilege Escalation

Find Commands

# Find flag
Get-ChildItem -Path C:\ -Recurse -Include "proof.txt", "local.txt" -Force 2>$null
dir /s/b local.txt
dir C:\local.txt /s /b 2>nul
dir C:\proof.txt /s /b 2>nul

# Files
tree /f /a
tree /s/b *.log
dir /s/b john\*.txt

Potato Attacks

Identify

# Identify privileges & privileges that may be of interest
whoami /priv
SeImpersonatePrivilege, SeBackupPrivilege, SeAssignPrimaryToken, SeLoadDriver, SeDebug
# SeRemoteShutdownPrivilege, SeShutdownPrivilege (local only). To shutdown
shutdown /r /m \\target -t 0 /f or shutdown -r -t 1

# Check for security patches
systeminfo
Get-CimInstance -Class win32_quickfixengineering | Where-Object { $_.Description -eq "Security Update" }
Locate the CVE, check if it's patched.

GodPotato

JuicyPotato

SigmaPotato

PrintSpoofer

AlwaysInstallElevated

RunAs

Unquoted Service Paths

Service Binary Path

WSL

Last updated