当前位置:网站首页>Intranet Infiltration - Privilege Escalation
Intranet Infiltration - Privilege Escalation
2022-07-31 01:57:00 【haoaaao】
0x00 Local Privilege Escalation
️1. Introduction


️2. Different system default accounts
windows: user, Administrator, System
linux: User, Root
️3, windows privilege escalation
1) The administrator is elevated to system
(1) View information under the command line:
Change password command: net user username *
View existing user accounts in the current system: net user
View the basic information of the current account: net user username
View information on the graphical interface - computer management
Local user - user - group account

(2) Privilege Escalation Method 1//win xp /2003
a. Task Manager to view the processes of users with different privileges
b, command: at time

When the time comes to execute a cmd command, the executed cmd command is the system permission, which can be viewed with whoami, or viewed in the task manager.
But this method can only execute the at command once every time, and you need to find a way to keep the permissions in the system all the time.
c, the system opened with the previous commandIn the permission window, kill the current desktop environment (explorer process), and then start the desktop environment with the system account. At this time, the desktop environment is all under the system permission.



//At this point, the entire desktop environment is already system permissions.
(2) Privilege Escalation Method 2 //win7/8 system
Command: sc to create a service, as follows
//cmd /K start refers to creating a new cmd window service
sc Create service name binPath (specify to execute a command) = "cmd /K start" type = "own" type (start type) = interact (interactive)

View created system service
Start the created system service: sc start service name
//The system account will be called to start

The service started at this time (the new cmd window) is already the system permission.
(3) Method 3 of Privilege Escalation
wintools:Sysinternals suite
https://technel.microsoft.com/en-us/sysinternals/bb545027


2) Injection process privilege escalation
//Idea: Find a process running with sysytem privileges and inject yourself into this process
(1) Tool Download: Process Injector
http://www.tarasco.org/security/Process_Injector/

(2) Use of injection tools:
a, pinjector.exe -l (to view injectable processes)

b. Find a process with system permissions to inject.

//Inject the 656 port process, execute the cmd command, and specify the port as 555. When someone uses nc and other tools to link the 555 port, the cmd will be handed over to the other party, similar to the way of using nc for remote shell.

c, how to use port 555 after listening:
Use na in kali to connect to port 555 of the win system

View permissions, get system permissions:

边栏推荐
- 12 pictures take you to fully understand service current limit, circuit breaker, downgrade, and avalanche
- ShardingJDBC usage summary
- 1.非类型模板参数 2.模板的特化 3.继承讲解
- leetcode-399:除法求值
- 基于FPGA的售货机
- 力扣刷题之爬楼梯(7/30)
- Software testing basic interface testing - getting started with Jmeter, you should pay attention to these things
- PDF 拆分/合并
- uniapp使用第三方字体
- leetcode-1161:最大层内元素和
猜你喜欢

Static routing + PAT + static NAT (explanation + experiment)

multiplayer-hlap 包有问题,无法升级的解决方案

Observer mode (1)

Drools Rule Properties, Advanced Syntax

【Map与Set】之LeetCode&牛客练习

coldfusion文件读取漏洞(CVE-2010-2861)

How to design the changing system requirements

基于FPGA的售货机

Shell 脚本循环遍历日志文件中的值进行求和并计算平均值,最大值和最小值

VSCode Plugin: Nested Comments
随机推荐
Calculate S=a+aa+…+aa…a
leetcode-399:除法求值
There is a problem with the multiplayer-hlap package and the solution cannot be upgraded
软件测试报告有哪些内容?
Teach you how to configure Jenkins automated email notifications
Inter-vlan routing + static routing + NAT (PAT + static NAT) comprehensive experiment
汉诺塔问题
Shell 脚本循环遍历日志文件中的值进行求和并计算平均值,最大值和最小值
cudaMemcpy学习笔记
VSCode插件:嵌套注释
What level of software testing does it take to get a 9K job?
最高月薪20K?平均薪资近万...在华为子公司工作是什么体验?
Fiddler captures packets to simulate weak network environment testing
"Cloud native's master, master and vulgar skills" - 2022 National New College Entrance Examination Volume I Composition
【AcWing 第62场周赛】
Force buckled brush the stairs (7/30)
力扣刷题之爬楼梯(7/30)
MySql installation and configuration super detailed tutorial and simple method of building database and table
mmdetection训练一个模型相关命令
如何在 go 程序中暴露 Prometheus 指标