⚔️
DWSec Wiki
  • Welcome to the DWSec Notes
  • Windows Privilege Escalation
  • Active Directory
    • Fundamentals
      • Introduction
      • Protocols
      • Authentication
      • Glossary of terms
      • Objects
      • AD CS
    • Pentest Methodology
    • Insecure Logins
    • Bloodhound & ldapdomaindump
    • NTLMRelaying (445)
    • SMB Coercing (445)
    • Pre2k
    • DACL Abuse
    • Kerberoasting
    • Utility Tools
    • Powershell
  • Networking
    • Fundamentals
    • Pivoting, Tunneling and Portforwarding
    • DNS
    • Ligolo-ng
    • Toolbox
    • Protocols
      • 80/443 - HTTP/HTTPS
      • 389 - LDAP
      • 445 - SMB
  • Web
    • Active Enumeration
    • Passive Enumeration
  • ADPwn
  • Tools
    • Tools overview
Powered by GitBook
On this page

Was this helpful?

Welcome to the DWSec Notes

NextWindows Privilege Escalation

Last updated 5 months ago

Was this helpful?

👉 Welcome to this Cyber Security Wiki! Here I publish various resources on a variety of cyber security related topics. One of the main focuses is Active Directory Pentesting. But I also publish a lot of resources related to basic knowledge.

😊 Follow my journey through cybersecurity!

👀 Feel free to visit my website: for more projects!

Disclaimer - Legal and ethical information

The contents of this publication are intended solely for educational and research purposes and to promote IT security. It was created to deepen the understanding of technical vulnerabilities and attack vectors so that effective measures to secure IT systems can be developed and implemented.

  1. No incitement to unauthorized actions

Any information, methods or tools presented here may only be used in an authorized and legal environment. It is strictly forbidden in Germany and many other countries to access or manipulate third-party IT systems without the express consent of an owner or administrator (§ 202a StGB - spying on data, § 303b StGB - computer sabotage).

The author expressly rejects any responsibility for the misuse of the information provided here. Any use outside a legal and authorized framework violates applicable law and contradicts the ethical principles of the IT security community.

It is expressly pointed out that the information provided here may not be used to carry out attacks or harmful actions.

  1. Use exclusively in authorized environments

The scenarios, methods and techniques described in this publication have been carried out exclusively in controlled and legal test environments, such as:

  • Platforms such as Hack The Box or TryHackMe, specifically designed for security exercises.

  • Own lab environments that are operated in isolation and without connection to real networks.

Use on productive systems or third-party networks without express permission is illegal and will be prosecuted.

  1. Objective: Education and prevention

The purpose of this publication is to

  • Raise awareness of vulnerabilities in IT systems.

  • To help IT security professionals and organizations develop effective protective measures.

  • To improve defense strategies against potential attacks.

It is expressly pointed out that the information provided here may not be used to carry out attacks or malicious activities.

  1. Ethical responsibility

As part of the IT security community, the author is committed to the principles of ethics and responsibility in the field of cybersecurity. This includes in particular:

  • The protection of sensitive and confidential data.

  • Promoting security and stability in digital networks.

  • The rejection of any actions that cause damage or jeopardize the reputation of individuals, companies or institutions.

The publication of this content is in accordance with the principles of Responsible Disclosure, according to which vulnerabilities are made transparent in order to close security gaps and prevent damage.

  1. Disclaimer

The author accepts no liability for:

  • Direct, indirect or consequential damages that may arise from the use of the information provided.

  • Any consequences under criminal or civil law resulting from improper or unauthorized use of the content.

Each user is responsible for complying with the legal requirements of their country and for using the content exclusively for the purposes described. 6. request for responsible use

The author appeals to all readers to use the information provided here responsibly and to actively contribute to improving IT security. Any unethical or illegal use is contrary to the purpose of this publication and the core values of the IT security industry.

https://dw-security.com/
Page cover image