Privilege Escalation Checklist
Automated Tools
Metasploit:
multi/recon/local_exploit_suggester
Seatbelt: https://github.com/GhostPack/Seatbelt
Windows Exploit Suggester: https://github.com/AonCyberLabs/Windows-Exploit-Suggester
System Information
Check Installed OS and architecture
Get Installed updates
List environment variables
List local and network drives
View Domain Controllers
Network
Get interface and network configuration
Print routing table
List active connections
Show Firewall state and configuration
List network drives
View DNS cache
Users and Groups
Get current user
List all users
Get details about a specific user
View password policy
Get local groups
Services
Get running services
List unquoted service binaries
World Writeable Folders
Privilege Escalation Specific
Unquoted service paths
If value returned is AlwaysInstallElevated REG_DWORD 0x1
A malicious MSI can be used to install with elevated permissions from a standard privileged account.
Check Sticky Notes for passwords
Search File System for passwords and files of interest
Search for passwords
If current user can read Event Logs then get the latest PowerShell commands run on the system
Recycle Bin
Last updated