Chapter 4 - Windows Post-Exploitation

Practice the principle of least privilege. Do not log into a computer with administrator rights unless you must do so to perform specific tasks. Running your computer as an administrator (or as a Power User in Windows) leaves your computer vulnerable to security risks and exploits. Simply visiting an unfamiliar Internet site with these high-privilege accounts can cause extreme damage to your computer, such as reformatting your hard drive, deleting all your files, and creating a new user account with administrative access.”

— Indiana University (Best practices for computer security)

This is the phase I like to refer to as second pass enumeration or enumeration from the inside. Now that we've gained a foothold into the network it is crucial to run all of our enumeration from the ground up as an inside actor.

Resources

Windows Privilege Escalation Fundamentals - FuzzySecurity

Windows PrivEsc Check - GitHub

Windows Exploit Suggester - GitHub

Encyclopaedia Of Windows Privilege Escalation - YouTube

Level Up! Practical Windows Privilege Escalation - YouTube

Windows Privilege Escalation methods for PenTesters

Windows Attacks At is the new Black - YouTube

Well, that escalated quickly

Analyizing local privilege escalations in win2k

The System Challenge - Decoder's Blog

The Wallstreet of Windows Binaries

Windows Operating System Archaeology

Breaking .NET Through Serialization

Windows Kernel Exploits - GitHub

Cross Compiling from Kali

Transpile Python into EXE

Uploading Files

Security Stuff

Exploitation Techniques and Mitigations on Windows

Windows Exploitation

Authentication Registry Keys - MSDN

Demystifying AppContainers in Windows 8 Part 1

Protected Processes in Windows

LSA Authentication - MSDN

Intercepting System Calls on x86_64 Windows

Introduction to Windows Kernel Security

Windows 8 ASLR Internals

Windows Program Automatic Startup Locations

Demystifying the Windows Firewall

Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 … and a new network attack

Bypassing Firewalls with Port 23

Pass the hash is dead long live LocalAccountTokenFilterPolicy

NetView

Getting Windows to play with itself: A PenTester's guide to Windows API abuse

AZURE

Compromise as a Service: our pleAZURE

Powershell Foo

Resources

Attacking ADFS Endpoints with PowerShell

PowerShell AD Recon

PowerShell Secrets and Tactics

An Intro to PowerShell and how to use it for Evil

Offensive Active Directory with PowerShell

Low-Level Windows API Access From PowerShell - FuzzySecurity

PowerShell Unicorn

Sherlock for Powershell

Download File

Note: If the above does not work you might need to convert it into utf-16 little endian because this is what the Windows OS expects. More here: UTF-16 is used internally by systems such as Microsoft Windows

wget

Execute ps1

Stream contents of file

Get permissions of directory/file

Packet testing

Reverse ICMP shell

Services

Windows Privilege Escalation via weak Service Permissions

The Art of Becoming TrustedInstaller

LDAP

5 Ways to find Systems running domain admin processes

I hunt SysAdmins part 1

I hunt SysAdmins part 2

PenTesting Active Directory Environments: CrapMapExec

Active Directory Privilege Relationships: BloodHound

Active Directory Architecture - MSDN

A Week of Evading Microsoft ATA Day 1

Dumping a domains worth of passwords with mimikatz part 2

Attack Methods for gaining Domain Admin

Find AD users with empty passwords

Domain Trusts and why you should care

A PenTester's guide to group scoping

How to own any Windows network with group policy hijacking attacks

Kerberos

The Secret Life of Krbtgt

Kerberos Golden Ticket Protection

Kerberos Golden Ticket Final

Et Tu Kerberos

Abusing Microsoft Kerberos

How to pass the ticket through SSH tunnels

From Pass the Hash to Pass the Ticket with no pain

Abusing Token Privileges for LPE

Dump Hashes

Dump windows password hashes efficiently part 1

I'll get your credentials... Later! - FuzzySecurity

Grab the Windows Secrets! - Decoder's Blog

WCE

PSExec

You need to be an admin already it copies an executable to an admin share and registers a service and starts it

SysInternals PSExec - TechNet

PUPY

WinEXE

PSExec Pass the Hash

Lateral Movement with Invoke-PsExec

UAC

UACME

Anatomy of UAC Attacks - FuzzySecurity

WMIC

WMIExec.py

Insecure File Permissions

Elevating privileges by exploiting weak folder permissions

Insecure SYSVOL

RDP

RDP Hijacking: How to hijack RDS and RemoteApp sessions transparently to move through an organization

DLL Injection

Windows DLL Injection Basics

Portable Execution Injection

Automated DLL Enumeration

Automated DLL Injection

NTLM/v2

Practical guide to NTLM Relaying in 2017 AKA Getting a foothold in under 5 minutes

SMB Relay demystified and NTLMv2 Pwnage with Python

Token Stealing

Once you have admin access on a computer, you can use the tokens of the other users to access resources in the domain.

Passing the Hash

Pass the Hash toolkit

runas

Invoke-Runas

Runas Reference

Encapsulating SSH Traffic with httptunnel

SigThief

Last updated

Was this helpful?