githubEdit

Server Operators Active Directory Security Group

Actions that this group performs:

1) Start and stop services

2) Create and delete network shared resources

3) Backup and Restore files (SAM SECURITY SYSTEM hives dump)

4) Sign in to a server interactively

5) Format the hard disk drive of the computer

6) Shutdown the computer

Exploitation

Steps:

TIP: Upload a nc binary or run a powershell reverse shell if we use evil-winrm

Upload a nc binary to target machine

Upload /usr/share/windows-resources/binaries/nc.exe .

Configure your nc binary to be executed by a service within the machine

Setup listener (Attacker machine)

Restart service to catch reverse shell

Add our user to Administrators Group

Transfer the SysInternals tool accesschk.exe to target machine

Check services

Check more details about the specific service you want to exploit

If you have the right of "service_all_access" or similar, exploit the service

Restart Service for the payload to take effect

Verify escalation

If on RDP, log out, then login and run cmd as administrator to refresh token!

Last updated