# Windows Post Exploitation

- [info](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info.md)
- [Accounts](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/accounts.md)
- [Access Control List (ACL)](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/access-control-list-acl.md)
- [Access Control List (ACL)](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/access-control-list-acl-1.md)
- [Built-in AD Groups](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/built-in-ad-groups.md)
- [NTFS](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/ntfs.md)
- [NTFSvs. SMB](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/ntfs/ntfsvs.-smb.md)
- [Services](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/services.md)
- [Execution Policy](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/execution-policy.md)
- [Registry](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/registry.md)
- [Powershell](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/powershell.md)
- [Pillage & Recon](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon.md)
- [Host Recon](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon.md)
- [Net Commands](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon/net-commands.md)
- [Wmic Commands](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon/wmic-commands.md)
- [Dsquery](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon/dsquery.md)
- [Rights & Privileges](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/rights-and-privileges.md)
- [Users & Groups](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/users-and-groups.md)
- [Privilege Escalation](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation.md)
- [Legacy Operating Systems](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation/legacy-operating-systems.md)
- [Windows server 2008/2008 R2](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation/legacy-operating-systems/windows-server-2008-2008-r2.md)
- [Windows 7](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation/legacy-operating-systems/windows-7.md)
- [User Privileges](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges.md)
- [SeImpersonate & SeAssignPrimaryToken](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges/seimpersonate-and-seassignprimarytoken.md)
- [SeDebugPrivilege](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges/sedebugprivilege.md)
- [SeTakeOwnershipPrivilege](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges/setakeownershipprivilege.md)
- [Privileged Groups](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups.md)
- [Backup Operators](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/backup-operators.md)
- [Event Log Readers](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/event-log-readers.md)
- [DnsAdmins](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/dnsadmins.md)
- [Hyper-V Administrators](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/hyper-v-administrators.md)
- [Print Operators](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/print-operators.md)
- [Server Operators](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/server-operators.md)
- [User/Computer Description Field](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-computer-description-field.md)
- [Scheduled Tasks](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/scheduled-tasks.md)
- [Credential Hunting](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/credential-hunting.md)
- [Credential Sniffing](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/credential-sniffing.md)
- [Always Install Elevated](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/always-install-elevated.md)
- [Unquoted Service Path](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/unquoted-service-path.md)
- [Vulnerable Services](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/vulnerable-services.md)
- [Cookie Stealing](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/cookie-stealing.md)
- [Weak Service Permissions](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/weak-service-permissions.md)
- [Permissive Registry ACLs](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/permissive-registry-acls.md)
- [Modifiable Registry Autorun Binary](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/modifiable-registry-autorun-binary.md)
- [kernel Exploits](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/kernel-exploits.md)
- [Kernel Exploit Table](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/kernel-exploits/kernel-exploit-table.md)
- [VMDK, VHD and VHDX files](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/vmdk-vhd-and-vhdx-files.md)
- [Malicious SCF and .Ink File](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/malicious-scf-and-.ink-file.md)
- [SAM & LSA Attack](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/sam-and-lsa-attack.md)
- [LSASS Attack](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/lsass-attack.md)
- [NTDS.dit Attack](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/ntds.dit-attack.md)
- [Restic Backup Attack](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/restic-backup-attack.md)
- [Citrix Breakout](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/citrix-breakout.md)
- [Bypassing UAC](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/bypassing-uac.md)
- [Payloads](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/payloads.md)
- [File Transfer](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer.md)
- [NetExec Download & Upload](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/netexec-download-and-upload.md)
- [Base64 Encode & Decode](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/base64-encode-and-decode.md)
- [PowerShell Download & Upload](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/powershell-download-and-upload.md)
- [Code download & Upload](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/code-download-and-upload.md)
- [Powershell Remoting](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/powershell-remoting.md)
- [RDP](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/rdp.md)
- [File Encryption](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/file-encryption.md)
- [Tools](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools.md)
- [Hashcat](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/hashcat.md)
- [Common Modes](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/hashcat/common-modes.md)
- [John The Ripper](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/john-the-ripper.md)
- [Conversion](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/john-the-ripper/conversion.md)
- [Netcat / Ncat](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat.md)
- [Listener On Recipient](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat/listener-on-recipient.md)
- [Listener On Sender](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat/listener-on-sender.md)
- [Page 1](/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat/page-1.md)
