Slide 5
Slide 5 text
Common PrivEsc Technique
1. Basic Enumeration of the System
2. Cleartext Passwords (In Files, In Registry, etc)
3. Kernel Exploits
4. Token Impersonation (using Incognito)
5. Scheduled Tasks
6. Weak Service Permissions
7. Unquoted Service Paths
8. Vulnerable Drivers
9. AlwaysInstallElevated
10. Group Policy Preference