Windows PrivEsc
Password Harvesting
Unattended Windows Installations:
<Credentials>
<Username>Administrator</Username>
<Domain>thm.local</Domain>
<Password>MyPassword123</Password>
</Credentials>Powershell History
type %userprofile%\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txtSaved Windows Creds
IIS Config
From putty:
Quick wins
Scheduled Tasks
AlwaysInstallElevated
Service based
Permission abuse
Last updated