Windows Enum & Privilege Escalation
LOCAL
Enumeration
net usernet user <user>whoami /privwhoami /groupsipconfig /allnetstat -anttasklistschtasksPrivilege Escalation
Unquoted Service Path
binPath - Services [PrivEsc]
SeImpersonatePrivilege
Autorun
Startup Applications
Bypass UAC
Capturing configuration file credentials
Windows Enumeration Tools
Last updated
