Privilege Escalation Checklist

Automated Tools

System Information

Check Installed OS and architecture

systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"

Get Installed updates

systeminfo | find ": KB"

wmic qfe get Caption,Description,HotFixID,InstalledOn

List environment variables

List local and network drives

View Domain Controllers

Network

Get interface and network configuration

Print routing table

List active connections

Show Firewall state and configuration

List network drives

View DNS cache

Users and Groups

Get current user

List all users

Get details about a specific user

View password policy

Get local groups

Services

Get running services

List unquoted service binaries

World Writeable Folders

Privilege Escalation Specific

Unquoted service paths

If value returned is AlwaysInstallElevated REG_DWORD 0x1 A malicious MSI can be used to install with elevated permissions from a standard privileged account.

Check Sticky Notes for passwords

Search File System for passwords and files of interest

Search for passwords

If current user can read Event Logs then get the latest PowerShell commands run on the system

Recycle Bin

Last updated