😁
Try Harder Journey
  • About this Journey
  • Recon/Enumeration
  • Exploitation
    • Apache Exploitations
      • Log4j vuln CVE-2021-44228
  • Privilege Escalation
  • Linux/Unix
  • Reverse Shell CheatSheet
  • BOF
    • TryHackMe BOF Prep
  • Port Forwarding
  • File Transfer
  • Proof
  • Report
  • Python
  • AD Attack
    • HTB AD
      • HTB: Reel 10 Nov 2018
      • HTB: Active 08 Dec 2018
    • THM AD
    • Cheatsheets Notes
  • Cloud
    • Zero Trust
    • Azure
    • AWS
    • GCP
  • OSINT
  • Web Application
    • File upload vulnerabilities
      • Tryhackme File Upload Vulnerabilities
      • Web Security Academy File upload Vulnerabilities
      • Bypass Disable Functions (THM WT)
  • HTB
    • Blocky HTB Walkthrough
  • References
Powered by GitBook
On this page

Was this helpful?

Privilege Escalation

Windows and Linux Privilege Escalation notes or cheat sheet.

Windows Privilege Escalation

Collect some basic system information commands

C:\Windows\system32 >whoami
Windows XP:echo %usename% or whoami.exe or net users
C:\Windows\system32 >getuid or id
net users
net localgroups
C:\Windows\system32 >systeminfo
C:\Windows\system32 >System Information | findstr /B /C:"operating system name" /C:"operating system version"
Network:
C:\Windows\system32 >ipconfig /all
route print
arp -A
System patched:wmic qfe get Caption,Description,HotFixID,InstalledOn
C:\Windows\system32 >whoami /priv

PreviousLog4j vuln CVE-2021-44228NextLinux/Unix

Last updated 3 years ago

Was this helpful?