PrivEsc
Enumerate Priveleges
net user <username>whoami /allwhoami /privesc
Server Operator Group
- https://www.hackingarticles.in/windows-privilege-escalation-server-operator-group/
SeBackupPrivileges
- https://www.hackingarticles.in/windows-privilege-escalation-sebackupprivilege/
SeLoadDriverPrivileges
- https://github.com/JoshMorrison99/SeLoadDriverPrivilege
- https://github.com/k4sth4/SeLoadDriverPrivilege
SeImpersonatePrivilege & SeAssignPrimaryToken
- can be leveraged in combination with a tool such as JuicyPotato, PrintSpoofer, or RoguePotato to escalate to
SYSTEMlevel privileges,