|
29 | 29 | - [ ] Check if any [**AV**](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/windows-av-bypass/README.md) |
30 | 30 | - [ ] [**AppLocker Policy**](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/authentication-credentials-uac-and-efs/README.md#applocker-policy)? |
31 | 31 | - [ ] [**UAC**](https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/authentication-credentials-uac-and-efs/uac-user-account-control/README.md) |
| 32 | +- [ ] [**Admin Protection / UIAccess silent elevation**](windows-local-privilege-escalation/uiaccess-admin-protection-bypass.md)? |
| 33 | +- [ ] [**Secure Desktop accessibility registry propagation (RegPwn)**](windows-local-privilege-escalation/secure-desktop-accessibility-registry-propagation-regpwn.md)? |
32 | 34 | - [ ] [**User Privileges**](windows-local-privilege-escalation/index.html#users-and-groups) |
33 | 35 | - [ ] Check [**current** user **privileges**](windows-local-privilege-escalation/index.html#users-and-groups) |
34 | 36 | - [ ] Are you [**member of any privileged group**](windows-local-privilege-escalation/index.html#privileged-groups)? |
35 | 37 | - [ ] Check if you have [any of these tokens enabled](windows-local-privilege-escalation/index.html#token-manipulation): **SeImpersonatePrivilege, SeAssignPrimaryPrivilege, SeTcbPrivilege, SeBackupPrivilege, SeRestorePrivilege, SeCreateTokenPrivilege, SeLoadDriverPrivilege, SeTakeOwnershipPrivilege, SeDebugPrivilege** ? |
| 38 | +- [ ] Check if you have [**SeManageVolumePrivilege**](windows-local-privilege-escalation/semanagevolume-perform-volume-maintenance-tasks.md) to read raw volumes and bypass file ACLs |
36 | 39 | - [ ] [**Users Sessions**](windows-local-privilege-escalation/index.html#logged-users-sessions)? |
37 | 40 | - [ ] Check[ **users homes**](windows-local-privilege-escalation/index.html#home-folders) (access?) |
38 | 41 | - [ ] Check [**Password Policy**](windows-local-privilege-escalation/index.html#password-policy) |
|
93 | 96 | - [ ] [**SSH keys in registry**](windows-local-privilege-escalation/index.html#ssh-keys-in-registry)? |
94 | 97 | - [ ] Passwords in [**unattended files**](windows-local-privilege-escalation/index.html#unattended-files)? |
95 | 98 | - [ ] Any [**SAM & SYSTEM**](windows-local-privilege-escalation/index.html#sam-and-system-backups) backup? |
| 99 | +- [ ] If [**SeManageVolumePrivilege**](windows-local-privilege-escalation/semanagevolume-perform-volume-maintenance-tasks.md) is present, try raw-volume reads for `SAM`, `SYSTEM`, DPAPI material, and `MachineKeys` |
96 | 100 | - [ ] [**Cloud credentials**](windows-local-privilege-escalation/index.html#cloud-credentials)? |
97 | 101 | - [ ] [**McAfee SiteList.xml**](windows-local-privilege-escalation/index.html#mcafee-sitelist.xml) file? |
98 | 102 | - [ ] [**Cached GPP Password**](windows-local-privilege-escalation/index.html#cached-gpp-pasword)? |
|
113 | 117 |
|
114 | 118 | - [ ] Check if you can abuse it |
115 | 119 |
|
116 | | -{{#include ../banners/hacktricks-training.md}} |
117 | 120 |
|
118 | 121 |
|
| 122 | +## References |
| 123 | + |
| 124 | +- [Project Zero - Bypassing Administrator Protection by Abusing UI Access](https://projectzero.google/2026/02/windows-administrator-protection.html) |
| 125 | +- [MDSec - RIP RegPwn](https://www.mdsec.co.uk/2026/03/rip-regpwn/) |
119 | 126 |
|
| 127 | + |
| 128 | +{{#include ../banners/hacktricks-training.md}} |
0 commit comments