Back to Blog
WindowsRed TeamingPrivilege EscalationLateral Movement

How to Hijack a Windows System with Nothing but Built-in Tools

Thu, Mar 20, 20252 min read

How to Hijack a Windows System with Nothing but Built-in Tools

A realistic multi-stage attack demonstration using only built-in Windows tools, showcasing advanced red teaming techniques.

Overview

This writeup demonstrates how an attacker can compromise a Windows environment using nothing but tools that come pre-installed with Windows. No external tools, no downloads, just pure Windows native capabilities.

Initial Access

The attack begins with initial access through various vectors:

  • Phishing emails with malicious attachments
  • USB drops
  • Compromised credentials
  • Social engineering

Stage 1: Information Gathering

Using built-in Windows commands:

systeminfo
whoami /all
net user
net localgroup administrators

Stage 2: Privilege Escalation

Leveraging Windows built-in tools for privilege escalation:

  • PowerShell: For script execution and system manipulation
  • WMIC: Windows Management Instrumentation Command-line
  • schtasks: Task scheduler manipulation
  • reg: Registry modifications

Stage 3: Lateral Movement

Moving through the network using:

  • PsExec (if available) or PowerShell remoting
  • WMI for remote command execution
  • SMB shares for data exfiltration

Stage 4: Persistence

Establishing persistence mechanisms:

  • Scheduled tasks
  • Registry run keys
  • Service creation
  • Startup folder manipulation

Detection and Mitigation

Organizations should:

  • Monitor for unusual PowerShell activity
  • Implement application whitelisting
  • Enable command-line auditing
  • Monitor for lateral movement indicators
  • Implement network segmentation

Conclusion

This demonstrates that attackers don't always need sophisticated tools. Understanding Windows built-in capabilities is crucial for both attackers and defenders.

Back to Blog