Status — Under Development
☯
This module is under development
Module 07 covers local privilege escalation techniques relevant to Windows AD environments — moving from a standard user or low-privilege service account to SYSTEM or local Administrator. Content is being written and will be published here when ready.
Token Impersonation
SeImpersonatePrivilege
PrintSpoofer / RoguePotato
Service Misconfigs
Unquoted Service Paths
Weak Service Permissions
DLL Hijacking
AlwaysInstallElevated
Scheduled Task Abuse
Back to course overview