Chapter 4 - Windows Post-Exploitation

Practice the principle of least privilege. Do not log into a computer with administrator rights unless you must do so to perform specific tasks. Running your computer as an administrator (or as a Power User in Windows) leaves your computer vulnerable to security risks and exploits. Simply visiting an unfamiliar Internet site with these high-privilege accounts can cause extreme damage to your computer, such as reformatting your hard drive, deleting all your files, and creating a new user account with administrative access.”

β€” Indiana University (Best practices for computer security)

This is the phase I like to refer to as second pass enumeration or enumeration from the inside. Now that we've gained a foothold into the network it is crucial to run all of our enumeration from the ground up as an inside actor.

Resources

Windows Privilege Escalation Fundamentals - FuzzySecurityarrow-up-right

Windows PrivEsc Check - GitHubarrow-up-right

Windows Exploit Suggester - GitHubarrow-up-right

Encyclopaedia Of Windows Privilege Escalation - YouTubearrow-up-right

Level Up! Practical Windows Privilege Escalation - YouTubearrow-up-right

Windows Privilege Escalation methods for PenTestersarrow-up-right

Windows Attacks At is the new Black - YouTubearrow-up-right

Well, that escalated quicklyarrow-up-right

Analyizing local privilege escalations in win2karrow-up-right

The System Challenge - Decoder's Blogarrow-up-right

The Wallstreet of Windows Binariesarrow-up-right

Windows Operating System Archaeologyarrow-up-right

Breaking .NET Through Serializationarrow-up-right

Windows Kernel Exploits - GitHubarrow-up-right

Cross Compiling from Kali

Transpile Python into EXE

Uploading Files

Security Stuff

Exploitation Techniques and Mitigations on Windowsarrow-up-right

Windows Exploitationarrow-up-right

Authentication Registry Keys - MSDNarrow-up-right

Demystifying AppContainers in Windows 8 Part 1arrow-up-right

Protected Processes in Windowsarrow-up-right

LSA Authentication - MSDNarrow-up-right

Intercepting System Calls on x86_64 Windowsarrow-up-right

Introduction to Windows Kernel Securityarrow-up-right

Windows 8 ASLR Internalsarrow-up-right

Windows Program Automatic Startup Locationsarrow-up-right

Demystifying the Windows Firewallarrow-up-right

Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 … and a new network attackarrow-up-right

Bypassing Firewalls with Port 23arrow-up-right

Pass the hash is dead long live LocalAccountTokenFilterPolicyarrow-up-right

NetViewarrow-up-right

Getting Windows to play with itself: A PenTester's guide to Windows API abusearrow-up-right

AZURE

Compromise as a Service: our pleAZUREarrow-up-right

Powershell Foo

Resources

Attacking ADFS Endpoints with PowerShellarrow-up-right

PowerShell AD Reconarrow-up-right

PowerShell Secrets and Tacticsarrow-up-right

An Intro to PowerShell and how to use it for Evilarrow-up-right

Offensive Active Directory with PowerShellarrow-up-right

Low-Level Windows API Access From PowerShell - FuzzySecurityarrow-up-right

PowerShell Unicornarrow-up-right

Sherlock for Powershellarrow-up-right

Download File

Note: If the above does not work you might need to convert it into utf-16 little endian because this is what the Windows OS expects. More here: UTF-16 is used internally by systems such as Microsoft Windowsarrow-up-right

wget

Execute ps1

Stream contents of file

Get permissions of directory/file

Packet testing

Reverse ICMP shell

Services

Windows Privilege Escalation via weak Service Permissionsarrow-up-right

The Art of Becoming TrustedInstallerarrow-up-right

LDAP

5 Ways to find Systems running domain admin processesarrow-up-right

I hunt SysAdmins part 1arrow-up-right

I hunt SysAdmins part 2arrow-up-right

PenTesting Active Directory Environments: CrapMapExecarrow-up-right

Active Directory Privilege Relationships: BloodHoundarrow-up-right

Active Directory Architecture - MSDNarrow-up-right

A Week of Evading Microsoft ATA Day 1arrow-up-right

Dumping a domains worth of passwords with mimikatz part 2arrow-up-right

Attack Methods for gaining Domain Adminarrow-up-right

Find AD users with empty passwordsarrow-up-right

Domain Trusts and why you should carearrow-up-right

A PenTester's guide to group scopingarrow-up-right

How to own any Windows network with group policy hijacking attacksarrow-up-right

Kerberos

The Secret Life of Krbtgtarrow-up-right

Kerberos Golden Ticket Protectionarrow-up-right

Kerberos Golden Ticket Finalarrow-up-right

Et Tu Kerberosarrow-up-right

Abusing Microsoft Kerberosarrow-up-right

How to pass the ticket through SSH tunnelsarrow-up-right

From Pass the Hash to Pass the Ticket with no painarrow-up-right

Abusing Token Privileges for LPEarrow-up-right

Dump Hashes

Dump windows password hashes efficiently part 1arrow-up-right

I'll get your credentials... Later! - FuzzySecurityarrow-up-right

Grab the Windows Secrets! - Decoder's Blogarrow-up-right

WCE

PSExec

You need to be an admin already it copies an executable to an admin share and registers a service and starts it

SysInternals PSExec - TechNetarrow-up-right

PUPYarrow-up-right

WinEXEarrow-up-right

PSExec Pass the Hasharrow-up-right

Lateral Movement with Invoke-PsExecarrow-up-right

UAC

UACMEarrow-up-right

Anatomy of UAC Attacks - FuzzySecurityarrow-up-right

WMIC

WMIExec.pyarrow-up-right

Insecure File Permissions

Elevating privileges by exploiting weak folder permissionsarrow-up-right

Insecure SYSVOL

RDP

RDP Hijacking: How to hijack RDS and RemoteApp sessions transparently to move through an organizationarrow-up-right

DLL Injection

Windows DLL Injection Basicsarrow-up-right

Portable Execution Injectionarrow-up-right

Automated DLL Enumerationarrow-up-right

Automated DLL Injectionarrow-up-right

NTLM/v2

Practical guide to NTLM Relaying in 2017 AKA Getting a foothold in under 5 minutesarrow-up-right

SMB Relay demystified and NTLMv2 Pwnage with Pythonarrow-up-right

Token Stealing

Once you have admin access on a computer, you can use the tokens of the other users to access resources in the domain.

Passing the Hash

Pass the Hash toolkitarrow-up-right

runas

Invoke-Runasarrow-up-right

Runas Referencearrow-up-right

Encapsulating SSH Traffic with httptunnel

SigThiefarrow-up-right

Last updated