

Keep this in mind as various OS/SP differences may exist in terms of commands not existing or generating slightly different output. It should be noted that I'll be using various versions of Windows to highlight any commandline differences that may exist. So lets dig into the dark corners of the Windows OS and see if we can get SYSTEM. On top of that the patch time window of opportunity is small.

I think the reasons for this are probably (1) during pentesting engagements a low-priv shell is often all the proof you need for the customer, (2) in staged environments you often pop the Administrator account, (3) meterpreter makes you lazy (getsystem = lazy-fu), (4) build reviews to often end up being -> authenticated nessus scan, microsoft security baseline analyser.Ĭontrary to common perception Windows boxes can be really well locked down if they are configured with care. Not many people talk about serious Windows privilege escalation which is a shame.
