In this project, you will find several methods that allow users to escalate privileges and gain admin rights in Windows systems. The detailed steps and techniques are provided in the accompanying HTML or PDF file included in this project.
- Exploiting Scheduled Tasks in the "Tasks Migrated" Folder
- Modifying Services via Registry
- Exploiting Unquoted Service Paths
- Abusing Services via AccessChk
- Hiding Activities using Windows Defender Exclusions
- Pass-the-Hash Attack with Mimikatz
- DLL Hijacking Attack
- The content is for educational purposes and should only be used in authorized environments.
- Refer to the HTML or PDF file for detailed instructions on each method.
- It is in Dutch
Disclaimer: This project is intended for educational purposes only and should be used for learning ethical hacking, penetration testing, and cybersecurity practices. The techniques and tools discussed are meant for use in authorized environments or with explicit permission. Unauthorized access to systems or networks is illegal and against GitHub's acceptable use policy.