πWindows PrivEsc Arena
Students will learn how to escalate privileges using a very vulnerable Windows 7 VM. RDP is open. Your credentials are user:password321
Room Attributes
Value
Task 1 Connecting to TryHackMe network
Connect to TryHackMe's VPN.
Task 2 Deploy the vulnerable machine
Deploy the machine and log into the user account via RDP
Open a command prompt and run 'net user'. Who is the other non-default user on the machine?
Task 3 Registry Escalation - Autorun
Task 4 Registry Escalation - AlwaysInstallElevated
Task 5 Service Escalation - Registry
Task 6 Service Escalation - Executable Files
Task 7 Privilege Escalation - Startup Applications
Task 8 Service Escalation - DLL Hijacking
Task 9 Service Escalation - binPath
Task 10 Service Escalation - Unquoted Service Paths
Task 11 Potato Escalation - Hot Potato
Task 12 Password Mining Escalation - Configuration Files
Task 13 Password Mining Escalation - Memory
Task 14 Privilege Escalation - Kernel Exploits
Last updated

