当前位置:网站首页>Intranet Infiltration - Privilege Escalation
Intranet Infiltration - Privilege Escalation
2022-07-31 01:57:00 【haoaaao】
0x00 Local Privilege Escalation
️1. Introduction


️2. Different system default accounts
windows: user, Administrator, System
linux: User, Root
️3, windows privilege escalation
1) The administrator is elevated to system
(1) View information under the command line:
Change password command: net user username *
View existing user accounts in the current system: net user
View the basic information of the current account: net user username
View information on the graphical interface - computer management
Local user - user - group account

(2) Privilege Escalation Method 1//win xp /2003
a. Task Manager to view the processes of users with different privileges
b, command: at time

When the time comes to execute a cmd command, the executed cmd command is the system permission, which can be viewed with whoami, or viewed in the task manager.
But this method can only execute the at command once every time, and you need to find a way to keep the permissions in the system all the time.
c, the system opened with the previous commandIn the permission window, kill the current desktop environment (explorer process), and then start the desktop environment with the system account. At this time, the desktop environment is all under the system permission.



//At this point, the entire desktop environment is already system permissions.
(2) Privilege Escalation Method 2 //win7/8 system
Command: sc to create a service, as follows
//cmd /K start refers to creating a new cmd window service
sc Create service name binPath (specify to execute a command) = "cmd /K start" type = "own" type (start type) = interact (interactive)

View created system service
Start the created system service: sc start service name
//The system account will be called to start

The service started at this time (the new cmd window) is already the system permission.
(3) Method 3 of Privilege Escalation
wintools:Sysinternals suite
https://technel.microsoft.com/en-us/sysinternals/bb545027


2) Injection process privilege escalation
//Idea: Find a process running with sysytem privileges and inject yourself into this process
(1) Tool Download: Process Injector
http://www.tarasco.org/security/Process_Injector/

(2) Use of injection tools:
a, pinjector.exe -l (to view injectable processes)

b. Find a process with system permissions to inject.

//Inject the 656 port process, execute the cmd command, and specify the port as 555. When someone uses nc and other tools to link the 555 port, the cmd will be handed over to the other party, similar to the way of using nc for remote shell.

c, how to use port 555 after listening:
Use na in kali to connect to port 555 of the win system

View permissions, get system permissions:

边栏推荐
- General introduction to the Unity interface
- Inner monologue from a female test engineer...
- Inter-vlan routing + static routing + NAT (PAT + static NAT) comprehensive experiment
- [Map and Set] LeetCode & Niu Ke exercise
- 【AcWing 第62场周赛】
- Introduction and use of Drools WorkBench
- 最高月薪20K?平均薪资近万...在华为子公司工作是什么体验?
- Arbitrum Interview | L2 Summer, what does the standout Arbitrum bring to developers?
- 加密生活,Web3 项目合伙人的一天
- Simple confession page
猜你喜欢

After reading "MySQL Database Advanced Practice" (SQL Xiao Xuzhu)

leetcode-952:按公因数计算最大组件大小

软件测试基础接口测试-入门Jmeter,你要注意这些事

1.非类型模板参数 2.模板的特化 3.继承讲解

MySQL的存储过程

Nacos

Fiddler captures packets to simulate weak network environment testing

Problems that need to be solved by the tcp framework

Detailed explanation of STP election (step + case)

曼城推出可检测情绪的智能围巾,把球迷给整迷惑了
随机推荐
C语言小程序 -- 常见经典练习题
Shell 脚本循环遍历日志文件中的值进行求和并计算平均值,最大值和最小值
Arbitrum Interview | L2 Summer, what does the standout Arbitrum bring to developers?
pc端判断当前使用浏览器类型
uniapp uses 3rd party fonts
Verify the integer input
CV-Model【3】:MobileNet v2
Inner monologue from a female test engineer...
《MySQL数据库进阶实战》读后感(SQL 小虚竹)
rpm install postgresql12
leetcode-128:最长连续序列
Is there a way to earn 300 yuan a day by doing a side business?
Brute Force/Adjacency Matrix Breadth First Directed Weighted Graph Undirected Weighted Graph
最大路径和
Teach you how to configure Jenkins automated email notifications
真正的CTO,是一个懂产品的技术人
GCC Rust is approved to be included in the mainline code base, or will meet you in GCC 13
cudaMemcpy学习笔记
计算S=a+aa+…+aa…a
What have I experienced when I won the offer of BAT and TMD technical experts?