windows-privilege-escalation
Escalate Privileges on Windows Systems
Discover and exploit Windows privilege escalation vulnerabilities during authorized penetration testing. Provides systematic methodologies for credential harvesting, service exploitation, and token impersonation.
スキルZIPをダウンロード
Claudeでアップロード
設定 → 機能 → スキル → スキルをアップロードへ移動
オンにして利用開始
テストする
「windows-privilege-escalation」を使用しています。 Enumerate privilege escalation vectors on this Windows host
期待される結果:
- === PRIVILEGE ESCALATION ASSESSMENT ===
- CRITICAL FINDINGS:
- - SeImpersonatePrivilege enabled - JuicyPotato exploitation possible
- - Unquoted service path: C:\Program Files\VulnApp\service.exe
- HIGH FINDINGS:
- - Service 'MyService' writable by Authenticated Users
- - AlwaysInstallElevated registry key enabled
- MEDIUM FINDINGS:
- - Stored credentials found in Windows Credential Manager
- - Weak file permissions on C:\Windows\Temp
- RECOMMENDED EXPLOITATION ORDER:
- 1. Exploit unquoted service path (low risk)
- 2. Abuse SeImpersonatePrivilege with JuicyPotato
- 3. Target vulnerable service configuration
「windows-privilege-escalation」を使用しています。 Find stored credentials on this system
期待される結果:
- === CREDENTIAL DISCOVERY RESULTS ===
- Registry Credentials:
- - HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
- DefaultUserName: Administrator
- DefaultPassword: [REDACTED - use reg query to view]
- Saved Windows Credentials:
- - Target: WORKGROUP\Administrator
- Type: Domain Password
- Persistence: Local Machine
- WiFi Passwords:
- - SSID: CorporateNetwork
- Key: [Use netsh wlan show profile name=SSID key=clear]
- POTENTIAL USE:
- - Attempt runas with discovered credentials
- - Try lateral movement with psexec
- - Test password reuse on other systems
セキュリティ監査
高リスクThis skill contains Windows privilege escalation techniques for authorized penetration testing. Static analysis detected 114 external command patterns (PowerShell, cmd.exe), 9 network references (standard pentest example IPs), and 5 filesystem operations. All findings are contextually appropriate for a defensive security tool. The skill includes proper legal disclaimers and is designed for authorized security testing only.
高リスクの問題 (3)
中リスクの問題 (2)
低リスクの問題 (1)
リスク要因
⚙️ 外部コマンド (9)
📁 ファイルシステムへのアクセス (3)
検出されたパターン
品質スコア
作れるもの
Penetration Testing Engagement
Security consultants performing authorized assessments use this skill to identify privilege escalation paths and demonstrate business impact to clients.
Red Team Operations
Red team members leverage these techniques to simulate adversary tactics and test organizational detection and response capabilities.
Security Training and CTF
Security professionals and students use this skill to learn Windows exploitation techniques in controlled lab environments and capture the flag competitions.
これらのプロンプトを試す
Enumerate the current Windows system for privilege escalation vectors. Check user privileges, group memberships, installed software, and running services. Present findings in a prioritized list.
Search for stored credentials on this Windows system. Check the registry, configuration files, Windows Credential Manager, and browser storage. Document any discovered credentials and their potential use.
Analyze Windows services for exploitation opportunities. Check for unquoted service paths, weak service permissions, and vulnerable service configurations. Provide specific exploitation steps for each finding.
Perform a complete Windows privilege escalation assessment. Run systematic enumeration across all vectors: system info, credentials, services, scheduled tasks, registry, and kernel vulnerabilities. Generate a prioritized exploitation roadmap with specific commands for each path.
ベストプラクティス
- Always obtain written authorization before testing any system you do not own
- Test exploitation techniques in a lab environment before production use
- Document all findings with timestamps and evidence for client reporting
- Avoid kernel exploits on production systems due to crash risk
- Clean up any tools or files created during the engagement
回避
- Running kernel exploits on production systems without backup and recovery plan
- Using loud enumeration techniques that trigger security alerts before objectives are met
- Leaving exploitation tools or backdoors on client systems after engagement ends
- Testing without proper scope definition and rules of engagement documentation
よくある質問
Is this skill legal to use?
Will these techniques work on all Windows versions?
Why do some exploits fail even when the vulnerability exists?
What is the safest privilege escalation technique?
Can I use this skill for defensive security work?
What tools do I need to transfer to the target system?
開発者の詳細
作成者
sickn33ライセンス
MIT
リポジトリ
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/windows-privilege-escalation参照
main
ファイル構成
📄 SKILL.md