Windows Privilege Escalation for Beginners, by Heath Adams

  • Course level: All Levels
  • Categories Development
  • Total Enrolled 0
  • Last Update February 5, 2022

About Course

Finding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell.

Description

This course teaches privilege escalation in Windows, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (150+), and a script which can be used by students to create an intentionally vulnerable Windows 10 configuration to practice their own privilege escalation skills on. This is a 100% privilege escalation course, with absolutely no filler!

Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method.

What Will I Learn?

  • Multiple methods for escalating privileges on a Windows system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Windows system.

Topics for this course

54 Lessons

1. Introduction

1. Course Introduction00:00:00
2. Resources and Tips for Success00:00:00

2. Gaining a Foothold

3. Initial Enumeration

4. Exploring Automated Tools

5. Escalation Path Kernel Exploits

6. Escalation Path Passwords and Port Forwarding

7. Escalation Path Windows Subsystem for Linux

8. Impersonation and Potato Attacks

9. Escalation Path getsystem

10. Escalation Path RunAs

11. Additional Labs

12. Escalation Path Registry

13. Escalation Path Executable Files

14. Escalation Path Startup Applications

15. Escalation Path DLL Hijacking

16. Escalation Path Service Permissions (Paths)

17. Escalation Path CVE-2019-1388

18. Capstone Challenge

19. BONUS Section

39.79

Requirements

  • A basic understanding of Windows systems
  • A familiarity with hacking tools such as Kali Linux and metasploit / msfvenom