windows-privilege-escalation
Escalate Privileges on Windows Systems
Discover and exploit Windows privilege escalation vulnerabilities during authorized penetration testing. Provides systematic methodologies for credential harvesting, service exploitation, and token impersonation.
Baixar o ZIP da skill
Upload no Claude
Vá em Configurações → Capacidades → Skills → Upload skill
Ative e comece a usar
Testar
A utilizar "windows-privilege-escalation". Enumerate privilege escalation vectors on this Windows host
Resultado esperado:
- === PRIVILEGE ESCALATION ASSESSMENT ===
- CRITICAL FINDINGS:
- - SeImpersonatePrivilege enabled - JuicyPotato exploitation possible
- - Unquoted service path: C:\Program Files\VulnApp\service.exe
- HIGH FINDINGS:
- - Service 'MyService' writable by Authenticated Users
- - AlwaysInstallElevated registry key enabled
- MEDIUM FINDINGS:
- - Stored credentials found in Windows Credential Manager
- - Weak file permissions on C:\Windows\Temp
- RECOMMENDED EXPLOITATION ORDER:
- 1. Exploit unquoted service path (low risk)
- 2. Abuse SeImpersonatePrivilege with JuicyPotato
- 3. Target vulnerable service configuration
A utilizar "windows-privilege-escalation". Find stored credentials on this system
Resultado esperado:
- === CREDENTIAL DISCOVERY RESULTS ===
- Registry Credentials:
- - HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
- DefaultUserName: Administrator
- DefaultPassword: [REDACTED - use reg query to view]
- Saved Windows Credentials:
- - Target: WORKGROUP\Administrator
- Type: Domain Password
- Persistence: Local Machine
- WiFi Passwords:
- - SSID: CorporateNetwork
- Key: [Use netsh wlan show profile name=SSID key=clear]
- POTENTIAL USE:
- - Attempt runas with discovered credentials
- - Try lateral movement with psexec
- - Test password reuse on other systems
Auditoria de Segurança
Alto RiscoThis skill contains Windows privilege escalation techniques for authorized penetration testing. Static analysis detected 114 external command patterns (PowerShell, cmd.exe), 9 network references (standard pentest example IPs), and 5 filesystem operations. All findings are contextually appropriate for a defensive security tool. The skill includes proper legal disclaimers and is designed for authorized security testing only.
Problemas de Alto Risco (3)
Problemas de Risco Médio (2)
Problemas de Baixo Risco (1)
Fatores de risco
⚙️ Comandos externos (9)
📁 Acesso ao sistema de arquivos (3)
Padrões Detectados
Pontuação de qualidade
O Que Você Pode Construir
Penetration Testing Engagement
Security consultants performing authorized assessments use this skill to identify privilege escalation paths and demonstrate business impact to clients.
Red Team Operations
Red team members leverage these techniques to simulate adversary tactics and test organizational detection and response capabilities.
Security Training and CTF
Security professionals and students use this skill to learn Windows exploitation techniques in controlled lab environments and capture the flag competitions.
Tente Estes Prompts
Enumerate the current Windows system for privilege escalation vectors. Check user privileges, group memberships, installed software, and running services. Present findings in a prioritized list.
Search for stored credentials on this Windows system. Check the registry, configuration files, Windows Credential Manager, and browser storage. Document any discovered credentials and their potential use.
Analyze Windows services for exploitation opportunities. Check for unquoted service paths, weak service permissions, and vulnerable service configurations. Provide specific exploitation steps for each finding.
Perform a complete Windows privilege escalation assessment. Run systematic enumeration across all vectors: system info, credentials, services, scheduled tasks, registry, and kernel vulnerabilities. Generate a prioritized exploitation roadmap with specific commands for each path.
Melhores Práticas
- Always obtain written authorization before testing any system you do not own
- Test exploitation techniques in a lab environment before production use
- Document all findings with timestamps and evidence for client reporting
- Avoid kernel exploits on production systems due to crash risk
- Clean up any tools or files created during the engagement
Evitar
- Running kernel exploits on production systems without backup and recovery plan
- Using loud enumeration techniques that trigger security alerts before objectives are met
- Leaving exploitation tools or backdoors on client systems after engagement ends
- Testing without proper scope definition and rules of engagement documentation
Perguntas Frequentes
Is this skill legal to use?
Will these techniques work on all Windows versions?
Why do some exploits fail even when the vulnerability exists?
What is the safest privilege escalation technique?
Can I use this skill for defensive security work?
What tools do I need to transfer to the target system?
Detalhes do Desenvolvedor
Autor
sickn33Licença
MIT
Repositório
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/windows-privilege-escalationReferência
main
Estrutura de arquivos
📄 SKILL.md