Checklist - Local Windows Privilege Escalation

Tip

AWS Hacking์„ ๋ฐฐ์šฐ๊ณ  ์—ฐ์Šตํ•˜์„ธ์š”:HackTricks Training AWS Red Team Expert (ARTE)
GCP Hacking์„ ๋ฐฐ์šฐ๊ณ  ์—ฐ์Šตํ•˜์„ธ์š”: HackTricks Training GCP Red Team Expert (GRTE)
Az Hacking์„ ๋ฐฐ์šฐ๊ณ  ์—ฐ์Šตํ•˜์„ธ์š”: HackTricks Training Azure Red Team Expert (AzRTE) ํ‰๊ฐ€ ํŠธ๋ž™ (ARTA/GRTA/AzRTA)๊ณผ Linux Hacking Expert (LHE)๋ฅผ ๋ณด๋ ค๋ฉด ์ „์ฒด HackTricks Training ์นดํƒˆ๋กœ๊ทธ๋ฅผ ๋‘˜๋Ÿฌ๋ณด์„ธ์š”.

HackTricks ์ง€์›ํ•˜๊ธฐ

Windows local privilege escalation vectors๋ฅผ ์ฐพ๋Š” ๋ฐ ๊ฐ€์žฅ ์ข‹์€ tool: WinPEAS

System Info

Logging/AV enumeration

Network

  • ํ˜„์žฌ network information ํ™•์ธ
  • ์™ธ๋ถ€์—์„œ๋งŒ ์ œํ•œ๋œ hidden local services ํ™•์ธ

Running Processes

Services

Applications

DLL Hijacking

  • PATH ๋‚ด๋ถ€์˜ ์–ด๋–ค folder์—๋“  writeํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€?
  • ์•Œ๋ ค์ง„ service binary ์ค‘ non-existant DLL์„ loadํ•˜๋ ค๊ณ  ์‹œ๋„ํ•˜๋Š” ๊ฒƒ์ด ์žˆ๋Š”๊ฐ€?
  • ์–ด๋–ค binaries folder์—๋“  writeํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€?

Network

  • network๋ฅผ ์—ด๊ฑฐ (shares, interfaces, routes, neighbours, โ€ฆ)
  • localhost (127.0.0.1)์—์„œ listen ์ค‘์ธ network services๋ฅผ ํŠน๋ณ„ํžˆ ์‚ดํŽด๋ณผ ๊ฒƒ

Windows Credentials

Files and Registry (Credentials)

Leaked Handlers

  • administrator๊ฐ€ ์‹คํ–‰ํ•œ process์˜ handler์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š”๊ฐ€?

Pipe Client Impersonation

  • ์ด๋ฅผ ์•…์šฉํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ํ™•์ธ

References

Tip

AWS Hacking์„ ๋ฐฐ์šฐ๊ณ  ์—ฐ์Šตํ•˜์„ธ์š”:HackTricks Training AWS Red Team Expert (ARTE)
GCP Hacking์„ ๋ฐฐ์šฐ๊ณ  ์—ฐ์Šตํ•˜์„ธ์š”: HackTricks Training GCP Red Team Expert (GRTE)
Az Hacking์„ ๋ฐฐ์šฐ๊ณ  ์—ฐ์Šตํ•˜์„ธ์š”: HackTricks Training Azure Red Team Expert (AzRTE) ํ‰๊ฐ€ ํŠธ๋ž™ (ARTA/GRTA/AzRTA)๊ณผ Linux Hacking Expert (LHE)๋ฅผ ๋ณด๋ ค๋ฉด ์ „์ฒด HackTricks Training ์นดํƒˆ๋กœ๊ทธ๋ฅผ ๋‘˜๋Ÿฌ๋ณด์„ธ์š”.

HackTricks ์ง€์›ํ•˜๊ธฐ