当前位置:网站首页>Intranet Infiltration - Privilege Escalation
Intranet Infiltration - Privilege Escalation
2022-07-31 01:57:00 【haoaaao】
0x00 Local Privilege Escalation
️1. Introduction
️2. Different system default accounts
windows: user, Administrator, System
linux: User, Root
️3, windows privilege escalation
1) The administrator is elevated to system
(1) View information under the command line:
Change password command: net user username *
View existing user accounts in the current system: net user
View the basic information of the current account: net user username
View information on the graphical interface - computer management
Local user - user - group account
(2) Privilege Escalation Method 1//win xp /2003
a. Task Manager to view the processes of users with different privileges
b, command: at time
When the time comes to execute a cmd command, the executed cmd command is the system permission, which can be viewed with whoami, or viewed in the task manager.
But this method can only execute the at command once every time, and you need to find a way to keep the permissions in the system all the time.
c, the system opened with the previous commandIn the permission window, kill the current desktop environment (explorer process), and then start the desktop environment with the system account. At this time, the desktop environment is all under the system permission.
//At this point, the entire desktop environment is already system permissions.
(2) Privilege Escalation Method 2 //win7/8 system
Command: sc to create a service, as follows
//cmd /K start refers to creating a new cmd window service
sc Create service name binPath (specify to execute a command) = "cmd /K start" type = "own" type (start type) = interact (interactive)
View created system service
Start the created system service: sc start service name
//The system account will be called to start
The service started at this time (the new cmd window) is already the system permission.
(3) Method 3 of Privilege Escalation
wintools:Sysinternals suite
https://technel.microsoft.com/en-us/sysinternals/bb545027
2) Injection process privilege escalation
//Idea: Find a process running with sysytem privileges and inject yourself into this process
(1) Tool Download: Process Injector
http://www.tarasco.org/security/Process_Injector/
(2) Use of injection tools:
a, pinjector.exe -l (to view injectable processes)
b. Find a process with system permissions to inject.
//Inject the 656 port process, execute the cmd command, and specify the port as 555. When someone uses nc and other tools to link the 555 port, the cmd will be handed over to the other party, similar to the way of using nc for remote shell.
c, how to use port 555 after listening:
Use na in kali to connect to port 555 of the win system
View permissions, get system permissions:
边栏推荐
猜你喜欢
Fiddler captures packets to simulate weak network environment testing
MySQL的安装教程(嗷嗷详细,包教包会~)
What have I experienced to become a tester who is harder than development?
1. Non-type template parameters 2. Specialization of templates 3. Explanation of inheritance
case语句的综合结果,你究竟会了吗?【Verilog高级教程】
What are the project management tools like MS Project
rpm安装postgresql12
leetcode-952:按公因数计算最大组件大小
MySQL的存储过程
There is a problem with the multiplayer-hlap package and the solution cannot be upgraded
随机推荐
leetcode-399: division evaluation
mysql index
验证整数输入
【Map与Set】之LeetCode&牛客练习
Can an inexperienced college graduate switch to software testing?my real case
成为比开发硬气的测试人,我都经历了什么?
力扣每日一题-第46天-704. 二分查找
Static routing + PAT + static NAT (explanation + experiment)
12 pictures take you to fully understand service current limit, circuit breaker, downgrade, and avalanche
简易表白小页面
To write good test cases, you must first learn test design
[1153]mysql中between的边界范围
tcp框架需要解决的问题
C语言小程序 -- 常见经典练习题
vlan间路由+静态路由+NAT(PAT+静态NAT)综合实验
1. Non-type template parameters 2. Specialization of templates 3. Explanation of inheritance
leetcode-399:除法求值
静态路由解析(最长掩码匹配原则+主备路由)
Verify the integer input
软件测试报告有哪些内容?