Checklist
Attack
Generate a Reverse Shell Executable
Service Exploits - Insecure Service Permissions
Service Exploits - Unquoted Service Path
Service Exploits - Weak Registry Permissions
Service Exploits - Insecure Service Executables
Registry - AutoRuns
Registry - AlwaysInstallElevated
Passwords - Registry
Passwords - Saved Creds
Passwords - Security Account Manager (SAM)
Passwords - Passing the Hash
Scheduled Tasks
Insecure GUI Apps
Startup Apps
Privilege Escalation Scripts - PowerUp, WinPEAS, Seatbelt
Token Impersonation - Rogue Potato
Token Impersonation - PrintSpoofer
Last updated