Chapter 4 - Windows Post-Exploitation
Practice the principle of least privilege. Do not log into a computer with administrator rights unless you must do so to perform specific tasks. Running your computer as an administrator (or as a Power User in Windows) leaves your computer vulnerable to security risks and exploits. Simply visiting an unfamiliar Internet site with these high-privilege accounts can cause extreme damage to your computer, such as reformatting your hard drive, deleting all your files, and creating a new user account with administrative access.”
— Indiana University (Best practices for computer security)
This is the phase I like to refer to as second pass enumeration or enumeration from the inside. Now that we've gained a foothold into the network it is crucial to run all of our enumeration from the ground up as an inside actor.
Resources
Windows Privilege Escalation Fundamentals - FuzzySecurity
Windows PrivEsc Check - GitHub
Windows Exploit Suggester - GitHub
Encyclopaedia Of Windows Privilege Escalation - YouTube
Level Up! Practical Windows Privilege Escalation - YouTube
Windows Privilege Escalation methods for PenTesters
Windows Attacks At is the new Black - YouTube
Analyizing local privilege escalations in win2k
The System Challenge - Decoder's Blog
The Wallstreet of Windows Binaries
Windows Operating System Archaeology
Breaking .NET Through Serialization
Windows Kernel Exploits - GitHub
Cross Compiling from Kali
Transpile Python into EXE
Uploading Files
Security Stuff
Exploitation Techniques and Mitigations on Windows
Authentication Registry Keys - MSDN
Demystifying AppContainers in Windows 8 Part 1
Protected Processes in Windows
Intercepting System Calls on x86_64 Windows
Introduction to Windows Kernel Security
Windows Program Automatic Startup Locations
Demystifying the Windows Firewall
Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 … and a new network attack
Bypassing Firewalls with Port 23
Pass the hash is dead long live LocalAccountTokenFilterPolicy
Getting Windows to play with itself: A PenTester's guide to Windows API abuse
AZURE
Compromise as a Service: our pleAZURE
Powershell Foo
Resources
Attacking ADFS Endpoints with PowerShell
PowerShell Secrets and Tactics
An Intro to PowerShell and how to use it for Evil
Offensive Active Directory with PowerShell
Low-Level Windows API Access From PowerShell - FuzzySecurity
Download File
Note: If the above does not work you might need to convert it into utf-16 little endian because this is what the Windows OS expects. More here: UTF-16 is used internally by systems such as Microsoft Windows
wget
Execute ps1
Stream contents of file
Get permissions of directory/file
Packet testing
Reverse ICMP shell
Services
Windows Privilege Escalation via weak Service Permissions
The Art of Becoming TrustedInstaller
LDAP
5 Ways to find Systems running domain admin processes
PenTesting Active Directory Environments: CrapMapExec
Active Directory Privilege Relationships: BloodHound
Active Directory Architecture - MSDN
A Week of Evading Microsoft ATA Day 1
Dumping a domains worth of passwords with mimikatz part 2
Attack Methods for gaining Domain Admin
Find AD users with empty passwords
Domain Trusts and why you should care
A PenTester's guide to group scoping
How to own any Windows network with group policy hijacking attacks
Kerberos
Kerberos Golden Ticket Protection
How to pass the ticket through SSH tunnels
From Pass the Hash to Pass the Ticket with no pain
Abusing Token Privileges for LPE
Dump Hashes
Dump windows password hashes efficiently part 1
I'll get your credentials... Later! - FuzzySecurity
Grab the Windows Secrets! - Decoder's Blog
WCE
PSExec
You need to be an admin already it copies an executable to an admin share and registers a service and starts it
Lateral Movement with Invoke-PsExec
UAC
Anatomy of UAC Attacks - FuzzySecurity
WMIC
Insecure File Permissions
Elevating privileges by exploiting weak folder permissions
Insecure SYSVOL
RDP
DLL Injection
NTLM/v2
Practical guide to NTLM Relaying in 2017 AKA Getting a foothold in under 5 minutes
SMB Relay demystified and NTLMv2 Pwnage with Python
Token Stealing
Once you have admin access on a computer, you can use the tokens of the other users to access resources in the domain.
Passing the Hash
runas
Encapsulating SSH Traffic with httptunnel
Last updated
Was this helpful?