Checklist

Attack

Generate a Reverse Shell Executable

Service Exploits - Insecure Service Permissions

Service Exploits - Unquoted Service Path

Service Exploits - Weak Registry Permissions

Service Exploits - Insecure Service Executables

Registry - AutoRuns

Registry - AlwaysInstallElevated

Passwords - Registry

Passwords - Saved Creds

Passwords - Security Account Manager (SAM)

Passwords - Passing the Hash

Scheduled Tasks

Insecure GUI Apps

Startup Apps

Privilege Escalation Scripts - PowerUp, WinPEAS, Seatbelt

Token Impersonation - Rogue Potato

Token Impersonation - PrintSpoofer

Last updated