Tag

powershell

Guides, Privilege Escalation, Windows

Windows Privilege Escalation – Credentials Harvesting

Introduction

Windows systems and applications often store clear text, encoded or hashed credentials in files, registry keys or in memory.

When gaining initial access to a Windows machine and performing privilege escalation enumeration steps, often passwords can be found through these means and they can be used to further escalate privileges.

Read more