Penetration Test
Privilege Escalation(Windows)
WINDOWS-SPECIFIC PRIVILEGE ESCALATION
- Cpassword - Group Policy Preference attribute that contains passwords
- SYSVOL folder of the Domain Controller (encrypted XML)
- Clear text credentials in LDAP(Lightweight Directory Access Protocol)
- Kerberoasting - Domain users can query Kerberos tickets for other users
- Credentials in LSASS(Local Security Authority Subsystem Service)
- Unattended installation
- PXE (Preboot Execution Environment) credentials
- SAM database (Security Account Manager)
- Database that contains user passwords
- DLL hijacking (Dynamic Link Library)
- Forcing a loader to load a malicious DLL
QUICK REVIEW
- Cpassword and LDAP credentials may contain valuable credentials
- PXE(Preboot Execution Environment) credentials can be used to access system as an authorized user
- DLL hijacking is an attack vector that could allow an attacker to load malware
相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。