This document discusses privilege escalation on Windows systems. It describes the different user account types and privileges on Windows, including regular users, administrators, and the NT Authority account. It then explains how to perform local privilege escalation by replacing executable files launched during login to gain NT Authority privileges. Specifically, it suggests replacing files like Sticky Keys and Magnify to launch a command prompt with elevated access and add a new administrator account. The document provides steps for booting a live system, mounting the target drive, replacing files, and verifying elevated access. It concludes with recommendations for encrypting drives to protect against these techniques.