# Windows Privesc Checklist - Exploits - Watson - Wesgn - Tokens - SeImpersonate - SeBackup - SeAssignPrimaryToken - SeCreateToken - SeLoadDriver - SeRestore - SeTakeOwnership - SeTcb - Misconfigs - DLL Hijacking - Unquoted service paths - - Collection - Regedit Stored Passwords - Check installed software - Check if WSL its installed - Check localhost ports open - Check for user files in the system (ej. dir *.bat /s /a) ---- ``` CATEGORIZAR https://github.com/matterpreter/OffensiveCSharp/tree/master/DriverQuery ```
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up