This document outlines a lab procedure for privilege escalation by exploiting client-side vulnerabilities using Metasploit. It details the setup of a testing environment, including the use of Windows 7 as a victim machine, executing various tasks to perform exploitation, and attempts to escalate privileges while addressing security configurations. The final objective is to successfully extract NTLM hashes and clear event logs after bypassing User Account Control settings.