πŸ›—Windows PrivEsc Arena

Students will learn how to escalate privileges using a very vulnerable Windows 7 VM. RDP is open. Your credentials are user:password321

https://tryhackme.com/room/windowsprivescarena
Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthroughs

Difficulty

Medium

Tags

Security, Windows, PrivEsc

Task 1 Connecting to TryHackMe network

Connect to TryHackMe's VPN.

Task 2 Deploy the vulnerable machine

Deploy the machine and log into the user account via RDP

https://www.kali.org/tools/rdesktop/

Open a command prompt and run 'net user'. Who is the other non-default user on the machine?

Reveal Flag 🚩

🚩TCM

Task 3 Registry Escalation - Autorun

Task 4 Registry Escalation - AlwaysInstallElevated

Task 5 Service Escalation - Registry

Task 6 Service Escalation - Executable Files

Task 7 Privilege Escalation - Startup Applications

Task 8 Service Escalation - DLL Hijacking

Task 9 Service Escalation - binPath

Task 10 Service Escalation - Unquoted Service Paths

Task 11 Potato Escalation - Hot Potato

Task 12 Password Mining Escalation - Configuration Files

https://gchq.github.io/CyberChef/#recipe=From_Base64('A-Za-z0-9%2B/%3D',true,false)&input=Y0dGemMzZHZjbVF4TWpNPQ
Reveal Flag 🚩

🚩password123

Task 13 Password Mining Escalation - Memory

Task 14 Privilege Escalation - Kernel Exploits

Last updated