펜테스팅 위키
CtrlK
  • Welcome
    • Home
  • 정보 수집
    • OSINT
      • Sub Domain
      • Google Hacking
      • Github
      • IP Address
      • Employees
    • 내부망
      • RID Cycling
      • External Enumeration
      • Password Spraying
      • Password Must Change
      • Extension
        • xlsx/ods
        • pfx
        • vhd
        • pst
        • vbs
        • hc
      • Protocol
        • 21 - FTP
        • 22 - SSH
        • 25 - SMTP
        • 23 - Telnet
        • 53 - DNS
        • 80/443 - HTTP
        • 88 - Kerberos
        • 111 - RPC
        • 135 - msrpc
        • 139/445 - SMB
        • 389/636 - LDAP
        • 515 - LPD
        • 631 -IPP
        • 1433 - MSSQL
        • 5985/5986 - wsman
  • 초기 침투
    • CVEs
      • CVE-2024-9264
      • CVE-2025-31486
      • CVE-2025-32463
    • Phising
      • Command File
      • EXE + LNK
      • wax
      • Microsoft Word
    • Web
      • Quary Language
        • SQL
        • GraphQL
      • File Upload
      • File Download
      • XSS
      • SSRF
      • CSRF
      • Open Redirect
      • SOP / CORS
    • ZIP Slip
  • 지속성
    • Active Directory
      • Golden Tickets
      • Diamond Tickets
      • DC Shadow
      • Certificate
      • Create Account
    • Local
      • Task Scheduler
      • Startup Folder
      • Registry AutoRun
      • WMI Event Subscription
      • SSH Key Injection
      • Create Account
      • RID Hijacking
  • 권한 상승
    • Active Directory
      • DACL
        • ReadGMSAPassword
        • ReadLAPSPassword
        • ForceChangePassword
        • AddSelf
        • GenericAll
        • Inherited GenericAll
        • WriteOwner
        • GenericWrite
        • WriteSPN
        • AddMembers
        • WriteGPO
        • AddAllowedToAct
        • AllExtendedRights
        • WriteUAC
      • ADCS
        • Abuse Permissions
        • ESC1
        • ESC2
        • ESC3
        • ESC4
        • ESC5
        • ESC6
        • ESC7
        • ESC8
        • CVE-2022-26923
      • MS14-068
      • Server Operators
      • DnsAdmins
      • noPAC
      • Silver Tickets
      • KrbRelayUp
      • GPO
    • Windows
      • SeImpersonatePrivilege
      • Unquoted Service Path
      • Weak Service Permissions
      • Weak Service Binary Permissions
      • UAC Bypass
      • Always Install Elevated
      • Autoruns
      • Credential Manager
      • Local Service Account
  • 민감정보 탈취
    • Active Directory
      • Kerberoasting
      • Timeroasting
      • Targeted Kerberoasting
      • Inter-realm Kerberoasting
      • AS-REP Roasting
      • AS Requested Service Tickets
      • Unconstrained Delegation
      • Constrained Delegation
      • Alternate Service Name
      • Resource Based Constrained Delegation
      • Shadow Credentials
      • DCSync
      • LSASS
      • Backup Operators
      • SeEnableDelegationPrivilege
      • Domain Cached Credentials
      • Network Access Account Credentials
      • DPAPI Backup Key
      • WebDAV Relay
    • Windows
      • Unattended File
      • DPAPI
      • Hard-coding Credentials
      • SeBackupPrivilege
      • NTLM Relay
  • 측면 이동
    • Windows
      • WinRM
      • PsExec
      • WMI
      • DCOM
      • RDP
      • Port Forwarding
    • 파일 전송
      • SCP
      • ZIP
      • ncat
      • Windows
      • SMB
      • Base64
      • FTP
      • WebDav
      • curl
      • pscp
    • 터널링
      • SOCKS
      • Proxifier
      • Plink
  • 사용자 가장
    • Pass the Hash
    • Pass the Ticket
    • Pass the Certificate
    • Overpass the Hash
    • Token Impersonation
    • Make Token
    • Process Injection
  • Domain Trust
    • Trust Relationship
    • One-way Trust
      • Trust Account TGT
    • Two-way Trust
    • Parent & Child Trust
      • Enterprise Golden Ticket
    • External Trust
  • ETC
    • CS
      • Active Directory
      • Kerberos
      • NTLM
      • PKINIT
      • Integrity
      • Registry
      • Delegation
      • OAuth 2.0
      • S4U
      • SCCM
      • TRUSTWORTHY
      • Link Server Passwords
      • SSL Pinning
      • Trust Account
    • Tools
      • Cobalt Strike
      • BloodHound
      • LDAP Search
      • Hydra
      • Hashcat
      • Ligolo-ng
    • Home Lab
      • Domain Trust
      • SCCM
      • MSSQL
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. 권한 상승

Windows

SeImpersonatePrivilegeUnquoted Service PathWeak Service PermissionsWeak Service Binary PermissionsUAC BypassAlways Install ElevatedAutorunsCredential ManagerLocal Service Account
PreviousGPONextSeImpersonatePrivilege

Was this helpful?