/OSWindowsPrivEscalation

the Open Source Windows Privilege Escalation Guide

What is this?

a step by step guide to preform Windows related privilege escalation from limited shell into SYSTEM abusing misconfigurations and local exploits. We call it "WPECS" for short and can be accessed at AddaxSoft.com/WPECS with a dark and easy to read theme.

Contributions

You can contribute by forking the repository, modify index.md then send a pull request to the master brunch. Please see "Format" and adhere to them to make life easier for everyone If you need markdown (.md) help you can read this quick guide by Github First place would be to solve issues

Format and Rules

  • We use 4 spaces until I figure out how to turn tabs on (yes, I'm a tab guy)
  • 3 lines feeds before each headline H1
  • 2 line feeds before each headline H2
  • each major section (e.g. OS Enumuration) is a headline H1
  • each section (e.g searching passwords in fiels under looting for clear text passwords) is a headline H2
  • After each "chunk" of the document we add an html
    (break) using
  • If we ever use screenshots we try to be as specific as possible, animated gifs are even better.

Tips

  • you can use [Another section](#new-section) to reffer to a headline (e.g this will reffer to Format and rules)

todos

  • Set up the initial template
  • Find a cooler + catchy name for the project
  • Test the template rendering
  • Test webserver streaming
  • Open contributions
  • write the enumuration phase
  • add format + contributions sections to the readme.md
  • do some testing regarding console alises
  • test powershell calls (since we will run them non-interactively)
  • write some scripts for enum
  • shadow of gatherNetworkInfo.vbs info
  • add tightVNC portable server page