Privilege Escalation Path Finder
Map escalation paths across Windows, Linux, and Cloud -- every attack paired with its detection
Difficulty:
★★★★ Expert
Duration:
45-60 min
MicroSim
#39
Educational reference -- all data is synthetic. Every attack technique includes defensive detection and mitigation.
Privilege Escalation
Windows Security
Linux Security
Cloud Security
MITRE ATT&CK
Detection Engineering
Windows
Linux
Cloud
Challenge Mode
User Context Selector
Current User
YOURCOMPANY\web-svc (service account)
YOURCOMPANY\helpdesk (domain user)
NT AUTHORITY\NETWORK SERVICE
IIS APPPOOL\DefaultAppPool
Target OS
Windows Server 2022
Windows 10/11
Domain-Joined
Yes
No
Current Privileges
SeImpersonate
SeAssignPrimaryToken
SeDebug
SeBackup
SeRestore
SeTakeOwnership
Find Escalation Paths
User Context Selector
Current User
www-data
postgres
jenkins
ubuntu (sudo group)
custom user
Target OS
Ubuntu 22.04
CentOS 9
Debian 12
Container?
No
Docker Container
Kubernetes Pod
Observed Conditions
SUID binaries found
sudo access
Writable cron jobs
Outdated kernel
Binaries with capabilities
Writable /etc/passwd
Writable PATH directory
Docker socket accessible
Find Escalation Paths
AWS
Azure
GCP
Showing all AWS privilege escalation paths
Showing all Azure privilege escalation paths
Showing all GCP privilege escalation paths
Score:
0
/
500
Streak:
0
Correct:
0
/
5
Reset All