When an attacker attacks a Windows Operating System most of the time they will get a base shell or meterpreter session. This shell is limited in the actions it can perform. So, to elevate privileges, we need to enumerate different files, directories, permissions, logs and SAM files. The number...