📔
Cyber Security Notes
Ctrlk
  • Introduction
  • CVEs
  • Paper Reviews
  • Large Language Models
  • Security Basics Notes
  • Enumeration and Initial Compromise
  • Post Exploitation
    • Shell Escape Techniques
    • Getting stable shell after compromise
    • Linux Privilege Escalation
    • Windows Privilege Escalation
      • SeImpersonatePrivilege Token Impersonation
      • Firefox Creds
      • Potatoes
      • Print Spooler Basics
      • Print Spooler CVE 2020-1030
      • SpoolFool
    • Data Exfiltration Post Exploitation
  • Port Forwarding Cheatsheet
  • Powershell Essentials
  • Application Security
  • Linux 64-bit Assembly
  • Cloud Security
  • API Security
  • Reverse Engineering
  • CTF Challenge Learnings
  • Applied Cryptography
  • Tools for everything
  • Openssl
Powered by GitBook
On this page

Was this helpful?

  1. Post Exploitation

Windows Privilege Escalation

Updating continuously

SeImpersonatePrivilege Token ImpersonationFirefox CredsPotatoesPrint Spooler BasicsPrint Spooler CVE 2020-1030SpoolFool
PreviousBad permissionsNextSeImpersonatePrivilege Token Impersonation

Last updated 3 years ago

Was this helpful?