Skip to main content
Back to All Trainings
Training

Windows Privilege Escalation Techniques

Windows Privilege Escalation Techniques

Training Overview

The "Windows Privilege Escalation Techniques" training offers an in-depth focus on methods for escalating privileges in Windows operating systems. Designed to provide information on strategies and techniques for gaining higher-level access rights using existing access privileges in the system, this training begins with an introduction to privilege escalation, highlighting its importance and fundamental concepts.

Following the introductory section, the course covers information gathering techniques that allow participants to acquire the necessary foundational knowledge to conduct effective privilege escalation attempts on target systems.

The training delves deeply into various topics, including password, session, or hash stealing methods for privilege escalation; manipulating services; exploiting auto-run programs and scheduled tasks; vulnerabilities in Windows NT systems; and capturing tokens and user privileges. By explaining the tools and techniques that can be used in privilege escalation processes, the course aims to enhance participants' abilities to conduct security tests and identify potential security vulnerabilities in Windows environments.

What You Will Learn

  • How to find and exploit insecure service permissions.
  • Techniques for stealing user passwords, sessions, and hashes.
  • How to abuse auto-start programs and scheduled tasks.
  • How to leverage token impersonation to elevate privileges.

Who is this for?

  • Penetration Testers and Red Team operators.
  • Ethical Hackers.
  • System administrators wanting to understand offensive techniques.

Prerequisites

  • Strong knowledge of Windows internals and the permission model.
  • Proficiency in using the Windows command line.

Tools You Will Use

  • PowerUp
  • Mimikatz (Conceptual)
  • BloodHound (Conceptual)
  • Process Explorer

Training Sections

  • Introduction
  • Information Gathering
  • Elevating Privileges by Stealing Passwords, Sessions, or Hashes
  • Elevating Privileges Using Services
  • Auto-Start Programs
  • Windows NT
  • Tokens and User Privileges
  • Exam

Get Started

Unlock the skills to get ahead. Your training starts now.Start Training Now