소개
This skill serves as a comprehensive technical reference for security professionals and developers conducting authorized penetration tests or security audits. It offers a structured workflow for navigating the Windows security model, including deep-dive enumeration of system configurations, credential harvesting from sensitive files, and the exploitation of common misconfigurations like unquoted service paths or weak permissions. By providing ready-to-use PowerShell and CMD snippets for techniques ranging from token impersonation (Potato attacks) to kernel exploit identification, this skill accelerates the process of elevating privileges from standard user to Administrator or SYSTEM.