Privilege Escalation

The general goal of Windows privilege escalation is to further our access to a given system to a member of the Local Administrators group or the NT AUTHORITY\SYSTEM LocalSystem account. There may, however, be scenarios where escalating to another user on the system may be enough to reach our goal. Privilege escalation is often vital to continue through a network towards our ultimate objective, as well as for lateral movement.

As penetration testers, it's vital to understand manual privilege escalation techniques, especially in restrictive environments. When placed on a managed workstation with no internet, strict firewalls, and disabled USB ports, relying solely on tools or scripts may not be an option. In such cases, mastering Windows privilege escalation checks via PowerShell and the command line is essential.

Some of the ways that we can escalate privileges are:

  • Abusing Windows group privileges

  • Abusing Windows user privileges

  • Bypassing User Account Control

  • Abusing weak service/file permissions

  • Leveraging unpatched kernel exploits

  • Credential theft

  • Traffic Capture

Last updated