Privilege Escalation
Check Permissions
cacls C:\Path\To\Check\Permission
Meaning
PATH Variable Hijacking
env
cacls C:\Python313\Scripts\Service Exploits
Search Order Hijacking
Unquoted Service Paths
Weak Service Binary Permissions
Weak Service Registry Permissions
DLL Search Order Hijacking
UAC Bypass (Medium → High Integrity)
elevate Command
Exploit
Description
runasadmin Command
Exploit
Description
CMSTPLUA UAC Bypass
Quick Reference
Vulnerability
Detection
Exploitation
Last updated