Start interactive tutorial

← Back to Projects

Elevation 2 - Hidden Privileges in Windows

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm

🌱 How to Start This Lab

In this lab, you will analyze a corporate Windows server that hosts multiple user accounts. It is suspected that one of them has misconfigurations that could allow privilege escalation and lead to full system control.

Your objective is to identify exposed credentials, gain remote access to the machine, and analyze the environment's configuration to determine whether you can become an administrator.

🌱 How to Start This Lab

Follow these steps to begin:

  1. Download the virtual machine from this link:
We are sorry, you don't have enough privileges to access this block of content, please signup or upgrade your plan to access it.
1 https://storage.googleapis.com/cybersecurity-machines/elevation-windows-machine.ova
  1. Import the machine into your preferred virtualization manager like VirtualBox.
  2. To perform this lab, you'll need an additional virtual machine that will act as your attack environment. This machine must have cybersecurity tools. We recommend using Kali Linux.
    • Download the pre-built Kali Linux virtual machine image from its official website. Using the option for "Virtual Machines" from this link.
  3. Once both machines are started, you can begin the lab!

During your analysis, you may consider using:

  • Nmap, Netdiscover – for service discovery and resource detection
  • SMBClient – to enumerate and access shared resources
  • Hydra, rockyou.txt – for brute-force attacks on remote services

Remember: sometimes you don't need a technical vulnerability—just a bad security practice.

Happy hacking!

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • windows

  • cybersecurity

  • smb

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

  • owasp-a07-identification-authentication-failures

  • hydra

  • winrm