⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • 🏠HOME
    • About Me
  • 🛡️PENTESTING
    • RECON
    • SERVICES
    • WEB
    • OPERATIONS
    • PRIVESC
    • ACTIVE DIRECTORY
  • ⚒️COURSES
    • CPTS
      • 01. Enumeration
      • 02. Nmap
      • 03. Active Directory Enumeration & Attacks
      • 04. Attacking Common Services
      • 05. Attacking Common Applications
      • 06. File Inclusion
      • 07. Web Attacks
      • 08. Web Service & API Attacks
      • 09. Server-side Attacks
      • 10. Linux Privilege Escalation
      • 11. Windows Privilege Escalation
        • Priv Esc
        • 1.Getting the Lay of the Land
        • 2.Windows User Privileges
        • 3.Windows Group Privileges
          • 10.DnsAdmins
          • 11. Hyper-V Administrators
          • Key Concepts:
          • Key Concepts:
          • 8. Windows Built-in Groups
          • Exploiting Event Log Readers Group for Security Log Access
        • 4.Attacking the OS
        • 5.Credential Theft
        • 6.Restricted Environments
        • 7.Additional Techniques
        • 8.Dealing with End of Life Systems
      • Broken Authentication
      • Command Injections
      • File Transfer
      • File Upload Attacks
      • Ligolo-ng
      • Login Brute Forcing
      • Password Attacks
      • Password Cracking
      • Pivoting, Tunneling, and Port Forwarding
      • SQL Injection
      • Session Security Guide
      • Discover environmental variables of a system to identify the shell language
      • Upgrading TTY Shell
      • Using the Metasploit Framework
      • XSS
      • Vulnerability Assessment - CPTS
      • Firewall and IDS/IPS Evasion - CPTS
      • cpts-tips
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. ⚒️COURSESchevron-right
  2. CPTSchevron-right
  3. 11. Windows Privilege Escalation

3.Windows Group Privileges

10.DnsAdminschevron-right11. Hyper-V Administratorschevron-rightKey Concepts:chevron-rightKey Concepts:chevron-right8. Windows Built-in Groupschevron-rightExploiting Event Log Readers Group for Security Log Accesschevron-right
PreviousExploiting SeTakeOwnershipPrivilegechevron-leftNext10.DnsAdminschevron-right

Last updated 18 hours ago