πŸ‡
Jockey
search
⌘Ctrlk
Home
πŸ‡
Jockey
  • face-cowboy-hatWho Am I?
  • Certificates!
    • HTB ProLabs
    • CRTP
  • Pentesting
    • Ports
    • Active directory
    • Escalation
      • Windows priv esc
        • Kernal exploits
        • Runas
        • WSL
        • Autorun
        • Registry escalation
        • AlwaysInstallElevated
        • Startup application
        • Unquoted Service Path
        • Passswords
        • Impersonation Attacks
      • Linux priv esc
    • Persistence
  • Red teaming
    • Persistence
  • Resources
    • Active Directory
    • C2 resources
  • Writeups
    • HackTheBox Writeups
  • CTFs
    • METACTF
  • Misc stuff
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Pentestingchevron-right
  2. Escalation

Windows priv esc

Kernal exploitschevron-rightRunaschevron-rightWSLchevron-rightAutorunchevron-rightRegistry escalationchevron-rightAlwaysInstallElevatedchevron-rightStartup applicationchevron-rightUnquoted Service Pathchevron-rightPassswordschevron-rightImpersonation Attackschevron-right
PreviousEscalationchevron-leftNextKernal exploitschevron-right