πWindows PrivEsc Arena
Students will learn how to escalate privileges using a very vulnerable Windows 7 VM. RDP is open. Your credentials are user:password321
Room Attributes
Value
Subscription Required
False [Free]
Type
Walkthroughs
Difficulty
Medium
Tags
Security, Windows, PrivEsc
Task 1 Connecting to TryHackMe network
Connect to TryHackMe's VPN.
No answer needed
Task 2 Deploy the vulnerable machine
Deploy the machine and log into the user account via RDP
No answer needed
Open a command prompt and run 'net user'. Who is the other non-default user on the machine?
Task 3 Registry Escalation - Autorun
No answer needed
Task 4 Registry Escalation - AlwaysInstallElevated
No answer needed
Task 5 Service Escalation - Registry
No answer needed
Task 6 Service Escalation - Executable Files
No answer needed
Task 7 Privilege Escalation - Startup Applications
No answer needed
Task 8 Service Escalation - DLL Hijacking
No answer needed
Task 9 Service Escalation - binPath
No answer needed
Task 10 Service Escalation - Unquoted Service Paths
No answer needed
Task 11 Potato Escalation - Hot Potato
No answer needed
Task 12 Password Mining Escalation - Configuration Files
Task 13 Password Mining Escalation - Memory
No answer needed
Task 14 Privilege Escalation - Kernel Exploits
No answer needed
Last updated

