# Orodha - Kupandisha Mamlaka ya Windows ya Ndani
Jifunze kuhusu kuvamia AWS kutoka sifuri hadi shujaa na htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)! Njia nyingine za kusaidia HackTricks: * Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)! * Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com) * Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee * **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.** * **Shiriki mbinu zako za kuvamia kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
**Kikundi cha Usalama cha Kujaribu Kwa Bidii**
{% embed url="https://discord.gg/tryhardsecurity" %} *** ### **Zana bora ya kutafuta njia za kupandisha mamlaka ya ndani ya Windows:** [**WinPEAS**](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS) ### [Maelezo ya Mfumo](windows-local-privilege-escalation/#system-info) * [ ] Pata [**Maelezo ya Mfumo**](windows-local-privilege-escalation/#system-info) * [ ] Tafuta **mabao ya kernel** [**kwa kutumia scripti**](windows-local-privilege-escalation/#version-exploits) * [ ] Tumia **Google kutafuta** mabao ya kernel * [ ] Tumia **searchsploit kutafuta** mabao ya kernel * [ ] Maelezo ya kuvutia katika [**vars za mazingira**](windows-local-privilege-escalation/#environment)? * [ ] Manenosiri katika [**historia ya PowerShell**](windows-local-privilege-escalation/#powershell-history)? * [ ] Maelezo ya kuvutia katika [**vipimo vya mtandao**](windows-local-privilege-escalation/#internet-settings)? * [ ] [**Madereva**](windows-local-privilege-escalation/#drives)? * [ ] [**Uvamizi wa WSUS**](windows-local-privilege-escalation/#wsus)? * [**AlwaysInstallElevated**](windows-local-privilege-escalation/#alwaysinstallelevated)? ### [Uorodheshaji wa Kuingia/AV](windows-local-privilege-escalation/#enumeration) * [ ] Angalia [**Uorodheshaji** ](windows-local-privilege-escalation/#audit-settings)na [**WEF** ](windows-local-privilege-escalation/#wef)vipimo * [ ] Angalia [**LAPS**](windows-local-privilege-escalation/#laps) * [ ] Angalia ikiwa [**WDigest** ](windows-local-privilege-escalation/#wdigest)ipo * [ ] [**Ulinzi wa LSA**](windows-local-privilege-escalation/#lsa-protection)? * [**Guard ya Vyeti**](windows-local-privilege-escalation/#credentials-guard)[?](windows-local-privilege-escalation/#cached-credentials) * [**Vyeti Vilivyohifadhiwa**](windows-local-privilege-escalation/#cached-credentials)? * Angalia ikiwa kuna [**AV yoyote**](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/windows-av-bypass/README.md) * [**Sera ya AppLocker**](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/authentication-credentials-uac-and-efs/README.md#applocker-policy)? * [**UAC**](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/authentication-credentials-uac-and-efs/uac-user-account-control/README.md) * [**Haki za Mtumiaji**](windows-local-privilege-escalation/#users-and-groups) * Angalia [**haki za mtumiaji wa sasa**](windows-local-privilege-escalation/#users-and-groups) * Je, wewe ni [**mwanachama wa kikundi cha kuheshimiwa**](windows-local-privilege-escalation/#privileged-groups)? * Angalia ikiwa una [mojawapo ya vivuli hivi vimeamilishwa](windows-local-privilege-escalation/#token-manipulation): **SeImpersonatePrivilege, SeAssignPrimaryPrivilege, SeTcbPrivilege, SeBackupPrivilege, SeRestorePrivilege, SeCreateTokenPrivilege, SeLoadDriverPrivilege, SeTakeOwnershipPrivilege, SeDebugPrivilege** ? * [**Vikao vya Watumiaji**](windows-local-privilege-escalation/#logged-users-sessions)? * Angalia[ **nyumba za watumiaji**](windows-local-privilege-escalation/#home-folders) (upatikanaji?) * Angalia [**Sera ya Nywila**](windows-local-privilege-escalation/#password-policy) * Ni[ **nini ndani ya Ubao wa Kuchorea**](windows-local-privilege-escalation/#get-the-content-of-the-clipboard)? ### [Mtandao](windows-local-privilege-escalation/#network) * Angalia **sasa** [**habari za mtandao**](windows-local-privilege-escalation/#network) * Angalia **huduma za ndani zilizofichwa** zilizozuiwa kwa nje ### [Mchakato Unaoendeshwa](windows-local-privilege-escalation/#running-processes) * Mchakato wa faili na folda [**ruhusa**](windows-local-privilege-escalation/#file-and-folder-permissions) * [**Uchimbaji wa Nywila za Kumbukumbu**](windows-local-privilege-escalation/#memory-password-mining) * [**Programu za GUI zisizo salama**](windows-local-privilege-escalation/#insecure-gui-apps) * Pora vyeti na **mchakato wa kuvutia** kupitia `ProcDump.exe` ? (firefox, chrome, nk ...) ### [Huduma](windows-local-privilege-escalation/#services) * [Je, unaweza **kurekebisha huduma yoyote**?](windows-local-privilege-escalation/#permissions) * [Je, unaweza **kurekebisha** **faili** inayotekelezwa na **huduma yoyote**?](windows-local-privilege-escalation/#modify-service-binary-path) * [Je, unaweza **kurekebisha** **usajili** wa **huduma yoyote**?](windows-local-privilege-escalation/#services-registry-modify-permissions) * [Je, unaweza kutumia faida ya **njia ya faili** isiyo na nukuu ya huduma yoyote**?](windows-local-privilege-escalation/#unquoted-service-paths) ### [**Maombi**](windows-local-privilege-escalation/#applications) * [ ] **Andika** [**ruhusa kwenye maombi yaliyosakinishwa**](windows-local-privilege-escalation/#write-permissions) * [ ] [**Maombi ya Kuanza**](windows-local-privilege-escalation/#run-at-startup) * [ ] **Madereva** [**Dhaifu**](windows-local-privilege-escalation/#drivers) ### [Utekaji wa DLL](windows-local-privilege-escalation/#path-dll-hijacking) * [ ] Je, unaweza **kuandika kwenye folda yoyote ndani ya PATH**? * [ ] Je, kuna huduma inayojulikana ya binary ambayo **jaribu kupakia DLL yoyote isiyopo**? * [ ] Je, unaweza **kuandika** kwenye **folda za binaries** yoyote? ### [Mtandao](windows-local-privilege-escalation/#network) * [ ] Hesabu mtandao (mgawanyo, interface, njia, majirani, ...) * [ ] Angalia kwa umakini huduma za mtandao zinazosikiliza kwenye localhost (127.0.0.1) ### [Siri za Windows](windows-local-privilege-escalation/#windows-credentials) * [ ] [**Winlogon** ](windows-local-privilege-escalation/#winlogon-credentials)siri * [ ] [**Hifadhi ya Windows**](windows-local-privilege-escalation/#credentials-manager-windows-vault) siri unazoweza kutumia? * [ ] Siri za [**DPAPI**](windows-local-privilege-escalation/#dpapi) zenye kuvutia? * [ ] Nywila za mtandao zilizohifadhiwa [**mitandao ya Wifi**](windows-local-privilege-escalation/#wifi)? * [ ] Taarifa zenye kuvutia katika [**mambo ya hivi karibuni**](windows-local-privilege-escalation/#recently-run-commands)? * [ ] [**Meneja wa Siri wa Desktop ya Mbali**](windows-local-privilege-escalation/#remote-desktop-credential-manager) nywila? * [ ] [**AppCmd.exe** ipo](windows-local-privilege-escalation/#appcmd-exe)? Nywila? * [ ] [**SCClient.exe**](windows-local-privilege-escalation/#scclient-sccm)? Upakiaji wa Upande wa DLL? ### [Faili na Usajili (Siri)](windows-local-privilege-escalation/#files-and-registry-credentials) * [ ] **Putty:** [**Siri**](windows-local-privilege-escalation/#putty-creds) **na** [**Vidole vya mwenyeji wa SSH**](windows-local-privilege-escalation/#putty-ssh-host-keys) * [ ] [**Vidole vya SSH kwenye usajili**](windows-local-privilege-escalation/#ssh-keys-in-registry)? * [ ] Nywila katika [**faili za bila usimamizi**](windows-local-privilege-escalation/#unattended-files)? * [ ] Backup yoyote ya [**SAM & SYSTEM**](windows-local-privilege-escalation/#sam-and-system-backups)? * [ ] [**Siri za Cloud**](windows-local-privilege-escalation/#cloud-credentials)? * [ ] Faili ya [**McAfee SiteList.xml**](windows-local-privilege-escalation/#mcafee-sitelist.xml)? * [ ] [**Nywila za GPP zilizohifadhiwa**](windows-local-privilege-escalation/#cached-gpp-pasword)? * [ ] Nywila katika [**faili ya usanidi wa Wavuti ya IIS**](windows-local-privilege-escalation/#iis-web-config)? * [ ] Taarifa zenye kuvutia katika [**magogo ya wavuti**](windows-local-privilege-escalation/#logs)? * [ ] Je, unataka [**kuomba siri**](windows-local-privilege-escalation/#ask-for-credentials) kwa mtumiaji? * [ ] Taarifa zenye kuvutia [**ndani ya Bakuli la Taka**](windows-local-privilege-escalation/#credentials-in-the-recyclebin)? * [ ] Usajili mwingine una [**siri**](windows-local-privilege-escalation/#inside-the-registry)? * [ ] Ndani ya [**Data ya Kivinjari**](windows-local-privilege-escalation/#browsers-history) (dbs, historia, alamisho, ...)? * [**Utafutaji wa nywila wa jumla**](windows-local-privilege-escalation/#generic-password-search-in-files-and-registry) katika faili na usajili * [**Zana**](windows-local-privilege-escalation/#tools-that-search-for-passwords) za kutafuta nywila kiotomatiki ### [Mabano Yaliyovuja](windows-local-privilege-escalation/#leaked-handlers) * [ ] Je, una ufikiaji wa mlezi wa mchakato unaoratibiwa na msimamizi? ### [Uigaji wa Mteja wa Mipira](windows-local-privilege-escalation/#named-pipe-client-impersonation) * [ ] Angalia ikiwa unaweza kutumia hilo **Kikundi cha Usalama cha Kujitahidi Kufanya**
{% embed url="https://discord.gg/tryhardsecurity" %}
Jifunze kuhusu udukuzi wa AWS kutoka sifuri hadi shujaa na htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)! Njia nyingine za kusaidia HackTricks: * Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)! * Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com) * Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee * **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.** * **Shiriki mbinu zako za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.