Embed presentation
Downloaded 65 times





























The document discusses various techniques for privilege escalation in Windows systems, including methods like abusing scheduled tasks and unquoted service paths. It outlines two main types of escalation: admin to system and user to system, highlighting the more complex nature of user to system escalations. The presentation also indicates various vulnerabilities and misconfigurations that can be exploited to gain higher privileges on Windows systems.
Introduction to the concept of Windows privilege escalation, emphasizing the need for gaining system-level access.
A personal disclaimer clarifying that the opinions expressed are those of the speaker, Dhruv Shah.
Introduction of the presenter, Dhruv Shah, with his Twitter handle and website.
Discussion on scenarios for privilege escalation including design flaws, system updates, and permissions.
Identifying the Windows operating systems that will be covered: Windows XP, 7, and 2003.
Explaining two types of privilege escalation: from Admin to System and User to System, emphasizing the latter's complexity.
Introduction to simple methods for escalating from Admin to System, highlighting tools like 'at' command and 'psexec'.
A demo showcasing methods of achieving system privileges using the discussed techniques.
Demonstration of achieving System privilege using the 'at' command.
Discussion on acquiring user hashes, with a note on the complexity of cracking secure passwords.
Description of how scheduled tasks can be exploited if the executing file is accessible to all users.
A demonstration of exploiting scheduled tasks for privilege escalation.
Overview of potential locations for sensitive credentials in user files and registries.
Discussion on the risks associated with weak directory permissions.
A demo related to weaknesses in directory permissions.
Overview of attack vectors related to service misconfigurations with emphasis on unquoted service paths.
Detailed explanation of unquoted service paths and the security implications thereof.
Demonstration of exploiting unquoted service paths.
Discussion on service binaries, how to exploit them, and a specific case of upnphost service.
Conclusion of the presentation and opening the floor for questions.



























