๐Ÿ› ๏ธ
CRTP Notes
  • ๐Ÿ› ๏ธCRTP Notes
  • โš™๏ธCRTP Methodology
  • ๐Ÿ’กMisc
    • PowerShell Basics
    • Bypass defenses
    • Transfer files
  • ๐Ÿ”จBasic enumeration
    • General
    • Network
    • Protection
  • โ›๏ธAD Enumeration
    • Gnereral
    • ACL
    • Forests and Trusts
  • ๐Ÿ”ชPrivilege Escalation
    • Local Privilege Escalation
    • Domain Privilege Escalation
      • Kerberoast
      • AS-REP Roasting
      • Delegations
    • Cross Domain Privilege Escalation
      • Trusts
      • AD CS
      • MSSQL Servers
  • ๐ŸŽ๏ธLateral Movement
    • WinRM
    • Credentials Dumping
    • DC Sync
    • Over Pass The Hash
    • Runas
  • ๐Ÿ”งPersistence
    • Kerberos
      • Golden Ticket
      • Silver Ticket
      • Diamond Ticket
    • Skeleton Key
    • DSRM
    • Custom SSP
    • AdminSDHolder
    • Security Descriptors
    • ACL
  • ๐Ÿ›ก๏ธMitigations
  • ๐Ÿ“šResources
    • AD attacking overall
    • Rubeus Guide
    • The Hacker Recipes
Powered by GitBook
On this page
  • Vectors
  • Tools
  • PowerUp
  • WinPEAS
  • Privesc
  • Automated checks
  • Services

Was this helpful?

  1. Privilege Escalation

Local Privilege Escalation

Last updated 7 months ago

Was this helpful?

The CRTP exam consists of 5 target servers in addition to a foothold student machine. The goal is to OS level command execution on all 5 targets not matter what the privileges of the user.

Vectors

There are various ways of locally escalating privileges on Windows box:

  • Missing patches โ€“ Automated deployment and AutoLogon passwords in clear text

  • AlwaysInstallElevated (Any user can run MSI as SYSTEM)

  • Misconfigured Services โ€“ DLL Hijacking and more

  • NTLM Relaying a.k.a. Won't Fix

This guide offer a sufficiently comprehensive overview of the course material for local privilege escalation

Tools

PowerUp

WinPEAS

Privesc

Automated checks

# PowerUp
Invoke-AllChecks

# winPEAS
winPEASx64.exe 

# Privesc
Invoke-PrivEsc

Services

Find vulnerable service configuration

# Get services with unquoted paths and spaces
Get-ServiceUnquoted -Verbose

# Get services where current user can write to binary path
Get-ModifiableServiceFile -Verbose

# Get the services whose configuration current user can modify
Get-ModifiableService -Verbose

Add domain user to the local Administrators group

Invoke-ServiceAbuse -Name 'AbyssWebServer' -UserName 'dcorp\studentx' -Verbose  
๐Ÿ”ช
https://github.com/0xStarlight/CRTP-Notes/blob/main/2-Local-Priv-Esc/1-Local-PrivEsc.md
PowerSploit/PowerUp.ps1 at master ยท PowerShellMafia/PowerSploitGitHub
PEASS-ng/winPEAS at master ยท carlospolop/PEASS-ngGitHub
GitHub - enjoiz/Privesc: Windows batch script that finds misconfiguration issues which can lead to privilege escalation.GitHub
Logo
Logo
Logo