Privileges Escalation Techniques (Basic to Advanced) for Windows

Hello Friend. Welcome back to a new part of this series.

Check out the first part of this series from HERE.

In this part, we’re going to cover 3 new techniques.

3. Privilege Escalation: Registry (AlwaysElevatedPrivileges (.msi))

Theory

.msi file is specifically designed for software installation on Windows operating systems. It contains information and files needed to install a software application in a standardized way that is managed by the Windows Installer service.

The “Always Elevated Privileges” vulnerability occurs in Windows Installer packages (.msi) that have been designed to run with administrative privileges by default. This means that any user or application that executes the .msi package is granted administrative privileges automatically, without requiring any further user input or authentication.

The AlwaysElevatedPrivileges methodology is simple;

Click Here