|
|
@ -138,34 +138,34 @@ |
|
|
|
- |
|
|
|
- [Privilege Escalation](#winprivesc) |
|
|
|
- [101](#pe101) |
|
|
|
- DLL Stuff](#dllstuff) |
|
|
|
- Exploits/Missing Patches](#peemp) |
|
|
|
- Fax/Printer/Network Service](#pfp) |
|
|
|
- Group Policy (Preferences)](#gppf) |
|
|
|
- Intel SYSRET](#peis) |
|
|
|
- LAPS](#pelaps) |
|
|
|
- Local Phishing](#pelp) |
|
|
|
- Logic Bugs](#pelb) |
|
|
|
- Named Pipes](#penp) |
|
|
|
- Privileged File Operation Abuse](#pepfoa) |
|
|
|
- NTLM-Related](#pentlm) |
|
|
|
- Privilege Abuse](#pepa) |
|
|
|
- Privileged File Operations](#pepfo) |
|
|
|
- Registry Paths/Permissions](#perpp) |
|
|
|
- Services](#peservices) |
|
|
|
- Unquoted Service Paths](#peusp) |
|
|
|
- Stored Creds/Passwords on disk](#pescp) |
|
|
|
- Tokens](#petokens) |
|
|
|
- Obtaining System Privileges](#peosp) |
|
|
|
- Talks & Presentations](#petalks) |
|
|
|
- Tools](#petools) |
|
|
|
- Writeups](#pewriteups) |
|
|
|
- Exploits](#peexploits) |
|
|
|
- Just-Enough-Administration(JEA)](#pejea) |
|
|
|
- Microsoft](#pems) |
|
|
|
- MSSQL](#pemssql) |
|
|
|
- VirtualMachines](#pevm) |
|
|
|
- VMWare](#pemvw) |
|
|
|
- [DLL Stuff](#dllstuff) |
|
|
|
- [Exploits/Missing Patches](#peemp) |
|
|
|
- [Fax/Printer/Network Service](#pfp) |
|
|
|
- [Group Policy (Preferences)](#gppf) |
|
|
|
- [Intel SYSRET](#peis) |
|
|
|
- [LAPS](#pelaps) |
|
|
|
- [Local Phishing](#pelp) |
|
|
|
- [Logic Bugs](#pelb) |
|
|
|
- [Named Pipes](#penp) |
|
|
|
- [Privileged File Operation Abuse](#pepfoa) |
|
|
|
- [NTLM-Related](#pentlm) |
|
|
|
- [Privilege Abuse](#pepa) |
|
|
|
- [Privileged File Operations](#pepfo) |
|
|
|
- [Registry Paths/Permissions](#perpp) |
|
|
|
- [Services](#peservices) |
|
|
|
- [Unquoted Service Paths](#peusp) |
|
|
|
- [Stored Creds/Passwords on disk](#pescp) |
|
|
|
- [Tokens](#petokens) |
|
|
|
- [Obtaining System Privileges](#peosp) |
|
|
|
- [Talks & Presentations](#petalks) |
|
|
|
- [Tools](#petools) |
|
|
|
- [Writeups](#pewriteups) |
|
|
|
- [Exploits](#peexploits) |
|
|
|
- [Just-Enough-Administration(JEA)](#pejea) |
|
|
|
- [Microsoft](#pems) |
|
|
|
- [MSSQL](#pemssql) |
|
|
|
- [VirtualMachines](#pevm) |
|
|
|
- [VMWare](#pemvw) |
|
|
|
- |
|
|
|
- [Windows Defense Evasion](#windefev) |
|
|
|
- [Anti-Malware Scan Interface](#amsi) |
|
|
|