# Windows Privesc Checklist - Exploits - Watson - Wesgn - Tokens - SeImpersonate - SeBackup - SeAssignPrimaryToken - SeCreateToken - SeLoadDriver - SeRestore - SeTakeOwnership - SeTcb - Misconfigs - DLL Hijacking - Unquoted service paths - - Collection - Regedit Stored Passwords - Check installed software - Check if WSL its installed - Check localhost ports open - Check for user files in the system (ej. dir *.bat /s /a) ---- ``` CATEGORIZAR https://github.com/matterpreter/OffensiveCSharp/tree/master/DriverQuery ```