Course Highlights
  • Multiple methods for escalating privileges on a Windows system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Windows system.
  • A setup script you can run on a (free) trial version of Windows 10, creating an intentionally vulnerable VM to practice privilege escalation on.
Curriculum

5 Topics
Introduction
Lab Setup
Privilege Escalation in Windows
Spawning Administrator Shells
Privilege Escalation Tools

12 Topics
Kernel Exploits
Service Exploits
Registry Exploits
Passwords
Scheduled Tasks
Insecure GUI Apps
Startup Apps
Installed Apps
Hot Potato
Token Impersonation
Port Forwarding
Privilege Escalation Strategy

2 Topics
getsystem (Named Pipes & Token Duplication)
User Privileges

  Write a Review

Windows Privilege Escalation for OSCP & Beyond!

Go to Paid Course