Windows Privilege Escalation
Overview
Windows privilege escalation elevates access from a standard user to SYSTEM or Administrator. After gaining initial access, escalation targets misconfigurations in services, registry settings, scheduled tasks, token privileges, and UAC bypasses. Always start with whoami /priv and automated tools (winPEAS) to identify vectors quickly.
Topics in This Section
General Approach
- Run automated enumeration — winPEAS to identify all potential vectors
- Check token privileges —
whoami /privfor SeImpersonate, SeDebug, SeBackup, etc. - Check services — unquoted paths, writable service binaries, weak permissions
- Check registry — AlwaysInstallElevated, autorun entries, stored credentials
- Check scheduled tasks — writable scripts, misconfigured permissions
- Check installed software — known vulnerable versions
- UAC bypass — if already local admin but running in medium integrity