# Windows Privesc Checklist
- Exploits
- Watson
- Wesgn
- Tokens
- SeImpersonate
- SeBackup
- SeAssignPrimaryToken
- SeCreateToken
- SeLoadDriver
- SeRestore
- SeTakeOwnership
- SeTcb
- Misconfigs
- DLL Hijacking
- Unquoted service paths
-
- Collection
- Regedit Stored Passwords
- Check installed software
- Check if WSL its installed
- Check localhost ports open
- Check for user files in the system (ej. dir *.bat /s /a)
----
``` CATEGORIZAR
https://github.com/matterpreter/OffensiveCSharp/tree/master/DriverQuery
```