Local PrivEsc
Find for some Unquoted Service Path Vulnerabilities
Check for some modifiable registry autoruns and configs
Unquoted service path is when a Windows service is installed, it is associated with an executable file that defines what the service does
This executable file is specified by a file path. If the file path contains spaces and is not enclosed in quotation marks, Windows might misinterpret it - allowing attackers to replace the payload with the original executable
Now restart the machine so that the service gets restarted !
AlwaysInstallElevated
AlwaysInstallElevated is a type of Registry Escalation, this is equivalent to granting full control just like the admin rights - An attacker can potentially drop a malicious msi and get a reverse shell
Refer this writeup
Abusing GPO permissions
We Abusing GPO by adding the user to the local Administrators group leveraging a tool called SharpGPOAbuse.exe
Export LAPS Passwords
Save it
Then, run the script to verify it works correctly. If it does, you should automate this procedure by creating a Scheduled Task
Last updated