🪟 Windows Privilege Escalation Lab

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — Windows privilege escalation techniques. Start as low-privilege user, escalate to SYSTEM or Administrator.
Lab Credentials: ram / pracivo  |  alice / alice123  |  administrator / Admin@2024 (goal: escalate to this)

Windows PrivEsc — Attack Paths

Logged in as: guest | Privilege: 🔴 LOW — need to escalate

TechniqueWhat It IsLab
Unquoted Service PathsService binary path with spaces and no quotes — hijackablePractice →
AlwaysInstallElevatedRegistry allows any user to install MSI as SYSTEMPractice →
Weak Service PermissionsLow-priv user can modify service binary pathPractice →
Token ImpersonationImpersonate SYSTEM token using PrintSpoofer or PotatoPractice →
DLL HijackingPlace malicious DLL where a privileged app loads itPractice →
Stored CredentialsCredentials saved in Windows Credential ManagerPractice →