📌
Pentest Notes
CtrlK
  • NETWORK
    • Internal Networks
      • Relays
        • IPV4
        • IPV6 With MITM6
      • Domain Enumeration
      • Bruteforcing and Password Spraying
      • Credential Access and Dumping
        • Mimikatz
        • Creating LSASS Dumps
      • Password Cracking
      • New Domain Admin
      • PowerShell One-Liners
      • File Shares
      • Kerberos
      • Endpoint Protection Evasion
        • Easy Wins
    • External Networks
      • Enumeration
        • Gobuster
        • Eyewitness
      • Office 365
        • Ruler
    • Red Teaming
      • Forced Authentication
      • Redirectors
      • Code Execution
      • DNS Redirector Setup
      • SMTP Redirector
    • Wireless
      • Boost Signal Strength
      • Bettercap
      • Cracking
    • Misc
      • Penetration Testing Notes and Commands
        • Useful Commands
          • Windows
            • Elevate to SYSTEM from Administrator
            • Disable Windows Activation Check
        • Misc PowerShell One-liners
  • Malware
    • Execution
      • Process Enumeration and Injection With Parent Process Name Check
      • DLL Side-Jacking
      • Excel 4.0 Macros
    • Detection Avoidance
      • Pwsh XOR
      • AMSI Bypass
      • Encrypter
      • Resource Encrypter
    • Other
      • bintoByte.py
  • Binary Exploitation
    • General
      • Methodology
      • Locating Bad Charecters
      • Useful Resources
    • SEH Overflow
    • Custom Shellcode
      • EXP-301 Module 0x07 Notes
      • EggHunter
      • ROP Decoder
    • Reverse Engineering
      • Windbg Notes
      • IDA Pro
      • Assembly
    • Memory Protection
      • ASLR
        • Module 0x0a
        • Extra Mile - Custom_srvr.exe Exploit
      • DEP
        • Module 0x09
        • Extra Mile 9_4_1_1
    • Format String Attacks
    • Example Exploits
      • Intelligent Management Center (iMC)
      • Sync Breeze v10.0.28
      • Adventech WebAccess SCADA
    • Fuzzing
      • WinAFL
        • Installation
        • Testing Coverage
        • Harness with Example
        • Testing Harness
        • Command Line Arguements
  • Mobile
    • Android
      • ADB Debuging
      • Sign APK
    • iOS
      • Rooting iOS
  • Game Hacking
    • Unity
      • IL2CPP
      • Change From Release to Debug
    • Assembly Resources
    • Cheat Engine Tutorial
  • Misc
    • Windows Internals
      • Event Viewer
      • RPC
        • RPC Enumeration
        • RPC Endpoints
        • Server Interaction
          • RPC Procedure Enumeration
    • Hardware
      • Cold Boot Attacks
      • Direct Memory Access (DMA) Attacks
Powered by GitBook
On this page

Was this helpful?

  1. NETWORK
  2. Misc
  3. Penetration Testing Notes and Commands
  4. Useful Commands

Windows

Elevate to SYSTEM from AdministratorDisable Windows Activation Check
PreviousUseful CommandsNextElevate to SYSTEM from Administrator

Last updated 3 years ago

Was this helpful?