SavitarX
search
⌘Ctrlk
LinkedinTryHackme
SavitarX
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
      • CPTS
        • Getting Started
        • Network Enumeration with Nmap
        • Footprinting
        • Attacking Common Services
        • File Transfers
        • Shells & Payloads
        • Using Metasploit Framework
        • Password Attacks
        • Pivoting, Tunneling, and Port Forwarding
        • Active Directory Enumeration & Attacks
        • Windows Privilege Escalation
          • Situational Awareness
          • Initial Enumeration
          • Communication with Processes
          • SeImpersonate and SeAssignPrimaryToken
          • SeeDebugPrivilege
          • SeTakeOwnershipPrivilege
          • Windows Built-in Groups
          • Event Log Readers
          • DnsAdmins
          • Server Operators
    • Blue Team
    • Web Pentesting
  • Writeups
    • Tryhackme
    • HTB Sherlocks
  • Machines to pratice for
    • CPTS Preparation
    • CDSA Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CERTIFICATIONS & noteschevron-right
  2. Red Teamchevron-right
  3. CPTS

Windows Privilege Escalation

Situational Awarenesschevron-rightInitial Enumerationchevron-rightCommunication with Processeschevron-rightSeImpersonate and SeAssignPrimaryTokenchevron-rightSeeDebugPrivilegechevron-rightSeTakeOwnershipPrivilegechevron-rightWindows Built-in Groupschevron-rightEvent Log Readerschevron-rightDnsAdminschevron-rightServer Operatorschevron-right
PreviousPrivileged Accesschevron-leftNextSituational Awarenesschevron-right