Windows Privilege Escalation Flashcards

(13 cards)

1
Q

You have a low-priv shell. A service runs as LocalSystem and its binary directory is writable by Users. What is the likely privesc?

A

Service binary replacement/hijack to execute as SYSTEM (with caution).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You find an unquoted service path: C:\Program Files\Vuln Service\service.exe. What’s the exploitation concept?

A

Drop an executable in a higher-precedence path segment (e.g., C:\Program.exe) if writable, then start service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A scheduled task runs a PowerShell script in C:\Scripts\backup.ps1 that you can edit. Next step?

A

Modify script for benign SYSTEM proof action/shell and wait/trigger task as permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You see a service loads a DLL from a directory writable by you. What is this?

A

DLL hijacking: replace the loaded DLL to execute code as the service account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You’re in Administrators group but whoami /groups shows medium integrity. What does that suggest?

A

UAC: you’re not fully elevated; need an elevation path or SYSTEM via service/task misconfig.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You find cleartext creds in C:\Windows\Panther\Unattend.xml. What should you do?

A

Use creds to pivot/escalate, then document chain and capture proof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WinRM (5985) is open and you obtained valid creds. What’s the next move?

A

Use WinRM for stable remote shell (authorized) and then enumerate privesc/AD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You dump a hash but plaintext isn’t available. What OSCP-relevant technique might still work?

A

Use hash-based auth where applicable (PtH) within allowed tool rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You identify SeImpersonatePrivilege. Why do you care?

A

Some privesc techniques exploit impersonation privileges to get SYSTEM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A service has weak registry permissions. How can that lead to privesc?

A

Modify service parameters (ImagePath) or related settings to execute code as service account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You can write to C:\ProgramData\ but not service directories. What should you hunt?

A

Other privileged auto-runs: tasks, startup folders, writable scripts/configs referenced by SYSTEM processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You got SYSTEM but haven’t captured proof.txt screenshot. What’s the immediate priority?

A

Capture required proof evidence (type proof.txt from original location + screenshot).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You suspect AV blocks your payload. What’s an OSCP-safe approach?

A

Prefer living-off-the-land and minimal custom payloads; document failures and use alternate methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly