⚠️ Pracivo Security Lab — Windows privilege escalation techniques. Start as low-privilege user, escalate to SYSTEM or Administrator.
Lab Credentials: ram / pracivo | alice / alice123 | administrator / Admin@2024 (goal: escalate to this)
Unquoted Service Paths
PRIVILEGE ESCALATION
wmic service get name,displayname,pathname,startmode | findstr /i "auto" | findstr /i /v "c:\windows\" | findstr /i /v wmic service get name,displayname,pathname,startmode | findstr /i "auto" | findstr /i /v "C:\\Windows\\"
Get-WmiObject -Class Win32_Service | Where-Object {$_.PathName -notmatch '"' -and $_.PathName -match ' '} | Select Name,PathName
icacls "C:\Program Files\Vuln App"
sc stop VulnService
sc start VulnService
. .\PowerUp.ps1
Invoke-AllChecks