← Home
Status — Under Development
This module is under development
Module 07 covers local privilege escalation techniques relevant to Windows AD environments — moving from a standard user or low-privilege service account to SYSTEM or local Administrator. Content is being written and will be published here when ready.
Token Impersonation SeImpersonatePrivilege PrintSpoofer / RoguePotato Service Misconfigs Unquoted Service Paths Weak Service Permissions DLL Hijacking AlwaysInstallElevated Scheduled Task Abuse
Back to course overview