Windows Privilege Escalation covers techniques to elevate from a standard user to Administrator or SYSTEM on Windows machines. From service misconfigurations to token manipulation, these skills are essential for Windows penetration testing.
Windows privilege escalation differs significantly from Linux. Instead of SUID binaries, you'll exploit services, tokens, and the registry. SYSTEM is the highest privilege level - even above Administrator!
Initial Enumeration
WinPEAS
WinPEAS automates Windows enumeration. Upload and run it for comprehensive privilege escalation checks with color-coded output.
Service Exploitation
Unquoted Service Paths
Insecure Service Permissions
Weak Service Binary Permissions
Registry Exploitation
AlwaysInstallElevated is a significant finding! It allows any user to install MSI packages with SYSTEM privileges.
Password Mining
Token Impersonation
Service Accounts
IIS AppPool, MSSQL, and other service accounts typically have SeImpersonatePrivilege. If you compromise these, Potato attacks give you SYSTEM!
Scheduled Tasks
UAC Bypass
Essential Tools
Knowledge Check
Key Takeaways
- Service misconfigurations are the most common Windows privesc vector
- Unquoted service paths are easy to exploit if you can write to parent directories
- SeImpersonatePrivilege = Potato attacks = SYSTEM
- Always check for saved credentials with cmdkey /list
- AlwaysInstallElevated is a critical finding
- Run WinPEAS for comprehensive automated enumeration