Group Privileges
Abusing Group Privileges
Dangerous Groups
whoami /groupsBuild-in Groups
Backup Operators
Pre-compiled Tools
Enable SeBackupPrivilege: Set-SeBackupPrivilege
Set-SeBackupPrivilegeCopying a Protected File
Attacking a Domain Controller - Copying NTDS.dit
Diskshadow
Backing up SAM and SYSTEM Registry Hives
Extract credentials
With NXC

References
Event Log Readers
Confirming Group Membership
Searching Security Logs Using wevtutil
Passing Credentials to wevtutil
Searching Security Logs Using Get-WinEvent
DnsAdmins
Generating Malicious DLL
Loading DLL as Member of DnsAdmins

Cleaning Up
Using Mimilib.dll
Creating a WPAD Record
Disabling the Global Query Block List
Adding a WPAD Record pointing to our attack machine
Hyper-V Administrators
Print Operators
Compile with cl.exe
Add Reference to Driver
Verify Driver is not Loaded
Verify Privilege is Enabled
Verify Capcom Driver is Listed
Use ExploitCapcom Tool to Escalate Privileges

Alternate Exploitation - No GUI
Automating the Steps
Clean up
Pre-compiled Tools
Server Operators
Querying the AppReadiness Service
Checking Service Permissions with PsService
Checking Local Admin Group Membership
Modifying the Service Binary Path
Starting the Service

Retrieving NTLM Password Hashes from the Domain Controller
“Network Configuration Operators” group
DHCP Administrators Group

Interesting Book
Interesting BooksSupport this Gitbook
Last updated

