Windows Built-in Groups

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-b--privileged-accounts-and-groups-in-active-directoryarrow-up-right

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-b--privileged-accounts-and-groups-in-active-directoryarrow-up-right

arrow-up-rightBackup Operators

Users trong group nร y mแบทc ฤ‘แป‹nh sแบฝ cรณ quyแปn SeBackupPrivilege cho phรฉp ta list ฤ‘ฦฐแปฃc tแบฅt cแบฃ cรกc file vร  lร m mแป™t sแป‘ thแปฉ khรกc.

ฤแปƒ khai thรกc SeBackupPrivilege ta sแบฝ dรนng script nร y: https://github.com/giuliano108/SeBackupPrivilegearrow-up-right

Ngoร i ra ta cลฉng cรณ thแปƒ copy file NTDS.dit cแปงa AD ฤ‘แปƒ dump hash

ฤแบงu tiรชn dรนng diskshadow ฤ‘แปƒ tแบกo แป• ฤ‘ฤฉa แบฃo, khi copy trรกnh แบฃnh hฦฐแปŸng ฤ‘แบฟn แป• ฤ‘ฤฉa C hiแป‡n tแบกi

Dรนng lแป‡nh nร y ฤ‘แปƒ bypas ACL vร  copy ntds.dit file

Lแบฅy thรชm SAM vร  SYSTEM reg

Extract bแบฑng Win

Extract bแบฑng Linux

Event Log Readers

Check quyแปn

Search logs tรฌm thรดng tin

Pass credentials vร o wevutil ฤ‘แปƒ search trรชn mรกy khรกc

Dรนng Get-WinEvent

DNS Admin

ร tฦฐแปŸng lร  lแปฃi dรนng quyแปn DNS Admin dรนng cmd dnscmd.exe ฤ‘แปƒ thรชm DLL ฤ‘แป™c hแบกi nhฦฐ lร  plugin. Sau ฤ‘รณ (nแบฟu cรณ quyแปn) restart DNS service. Lรบc nร y DLL ฤ‘แป™c hแบกi sแบฝ ฤ‘ฦฐแปฃc add vร o reg vร  ฤ‘ฦฐแปฃc thแปฑc thi.

Cรกc bฦฐแป›c thแปฑc hiแป‡n

Tแบกo dll ฤ‘แป™c hแบกi

Add dll ฤ‘แป™c hแบกi thร nh plugin

Check quyแปn xem DNS Admin cรณ quyแปn restart DNS service khรดng (mแบทc ฤ‘แป‹nh lร  ko cรณ)

Thแบฅy RPWP cรณ nghฤฉa lร  cรณ quyแปn stop vร  start

Restart service

Covertrack xรณa reg vร  restart lแบกi DNS

Ta cลฉng cรณ thแปƒ dรนn Mimilib.dll ฤ‘แปƒ exploit. Tham khแบฃo:

HyperV Admin

User trong group nร y sแบฝ cรณ quyแปn SeLoadDriverPrivilege cรณ thแปƒ thรชm, sแปญa, xรณa, quแบฃn lรฝ printers connections cแปงa Domain Controller

Nแบฟu ta nแบฑm trong group nร y mร  khรดng thแบฅy quyแปn SeLoadDriverPrivilege thรฌ rแบฅt cรณ thแปƒ lร  UAC ฤ‘รฃ chแบทn, ta cรณ thแปƒ bypass UAC bแบฑng tool nร y https://github.com/hfiref0x/UACMEarrow-up-right

ร tฦฐแปŸng tแบฅn cรดng lร  load mแป™t driver ฤ‘แป™c hแบกi cho phรฉp thแปฑc thi cmd (Capcom.sys). ฤแปƒ lร m ฤ‘ฦฐแปฃc ta cแบงn 1 tool hแป— trแปฃ load driver. Link tool ฤ‘แปƒ load drive: https://raw.githubusercontent.com/3gstudent/Homework-of-C-Language/master/EnableSeLoadDriverPrivilege.cpparrow-up-right

Sau khi tแบฃi vแป thรฌ thรชm vร o cรกc dรฒng khai bรกo sau

Rแป“i complie ra file exe

Tiแบฟp theo ta tแบฃi Capcom.sys vแป vร  quฤƒng lรชn mรกy target

Thรชm Capcom.sys vร o reg

Chแบกy tool load ฤ‘แปƒ load driver

Kiแปƒm tra

ฤแปƒ lแปฃi dแปฅng Capcom.sys ta dรนng ExploitCapcomarrow-up-right

Tool sแบฝ popup mแป™t cmd prompt cรณ quyแปn SYSTEM

Nแบฟu khรดng cรณ GUI ta cรณ thแปƒ chแป‰nh code cแปงa ExploitCapcom.cpp nhฦฐ sau

Replace dรฒng 292 thร nh load 1 con hร ng revershell (msfvenom chแบณng hแบกn)

Hoแบทc ta cรณ thแปƒ tแปฑ ฤ‘แป™ng exploit bแบฑng tool: https://github.com/TarlogicSecurity/EoPLoadDriver/arrow-up-right

Sau ฤ‘รณ chแบกy ExploitCapcom.exe ฤ‘แปƒ call SYSTEM

Covertrack

Server Operators

User trong group nร y sแบฝ cรณ quyแปn SeBackupPrivilege vร  SeRestorePrivilege ฤ‘แปƒ control local service

Check permision service vแป›i PSService

Last updated