Tool Reference
TOOOOOOOOOOLS :)
Windows Privilege Escalation cheatsheet
TOOOOOOOOOOLS :)
You have a shell. Before exploiting anything, understand where you are, what you have, and what's misconfigured. This page covers manual enumeration and automated tools.
Abusing misconfigured services, weak file permissions, unquoted paths, registry misconfigurations, and DLL hijacking to escalate privileges.
When service misconfigs and token tricks aren't viable, target the kernel itself. Identify missing patches, match them to known exploits, and get SYSTEM through unpatched vulnerabilities.
Abuse Windows token privileges to escalate from service accounts (IIS, MSSQL, etc.) to SYSTEM. If you have SeImpersonatePrivilege or SeAssignPrimaryTokenPrivilege, you're one potato away from SYSTEM.