Windows privilege escalation by Dhruv Shah

Security Researcher at Adobe, Chapter Leader at OWASP & null
Aug. 31, 2016
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv Shah
1 of 28

More Related Content

Slideshows for you

System hackingSystem hacking
System hackingCAS
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
Secure Code Review 101Secure Code Review 101
Secure Code Review 101Narudom Roongsiriwong, CISSP
How fun of privilege escalation  Red Pill2017How fun of privilege escalation  Red Pill2017
How fun of privilege escalation Red Pill2017Ammarit Thongthua ,CISSP CISM GXPN CSSLP CCNP
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)TzahiArabov
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi

Viewers also liked

Fundamentals of Linux Privilege EscalationFundamentals of Linux Privilege Escalation
Fundamentals of Linux Privilege Escalationnullthreat
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghOWASP Delhi
Privilege Escalation And Misconfigurations Part2Privilege Escalation And Misconfigurations Part2
Privilege Escalation And Misconfigurations Part2Caleb Sima
How to own the world, one desktop at a timeHow to own the world, one desktop at a time
How to own the world, one desktop at a timeSaumil Shah
The Mysteries Of JavaScript-Fu (@media Europe Edition)The Mysteries Of JavaScript-Fu (@media Europe Edition)
The Mysteries Of JavaScript-Fu (@media Europe Edition)danwrong
Raspberry piRaspberry pi
Raspberry piDhruv Shah

Similar to Windows privilege escalation by Dhruv Shah

Windows Privilege EscalationWindows Privilege Escalation
Windows Privilege EscalationRiyaz Walikar
Owning computers without shell access 2Owning computers without shell access 2
Owning computers without shell access 2Royce Davis
Windows Malware TechniquesWindows Malware Techniques
Windows Malware TechniquesLee C
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access darkRoyce Davis
So you want to be a security expertSo you want to be a security expert
So you want to be a security expertRoyce Davis
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfRohitGautam261127

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

巴塞罗那自治大学文凭认证真实留信网认证巴塞罗那自治大学文凭认证真实留信网认证
巴塞罗那自治大学文凭认证真实留信网认证dadot2
办美国本科毕业证实拍图毕业证本科硕士文凭哪家好办美国本科毕业证实拍图毕业证本科硕士文凭哪家好
办美国本科毕业证实拍图毕业证本科硕士文凭哪家好sovcyuv
购买杨百翰大学毕业证成绩单杨百翰大学毕业文凭证书购买杨百翰大学毕业证成绩单杨百翰大学毕业文凭证书
购买杨百翰大学毕业证成绩单杨百翰大学毕业文凭证书yovuyhp
美国罗德岛大学毕业证文凭认证 - 购买国外文凭证书美国罗德岛大学毕业证文凭认证 - 购买国外文凭证书
美国罗德岛大学毕业证文凭认证 - 购买国外文凭证书dadot2
如何办理温切斯特大学毕业证成绩单改成绩如何办理温切斯特大学毕业证成绩单改成绩
如何办理温切斯特大学毕业证成绩单改成绩uywmmd
买毕业证靠谱吗罗切斯特大学毕业证成绩单买毕业证靠谱吗罗切斯特大学毕业证成绩单
买毕业证靠谱吗罗切斯特大学毕业证成绩单uncesxy

Windows privilege escalation by Dhruv Shah

  1. Windows Privilege Escalation Because gaining shell to the system is just not enough
  2. C:> type disclaimer.txt • The opinions expressed in this presentation are mine and not those of my employer.
  3. • Dhruv Shah • @snypter • http://security-geek.in
  4. What are we here for ? • Different scenarios leading to privilege escalation • Design issues , implementation flaws, untimely system updates , permission issues etc • We ain’t talking about overflows here , just logics and techniques 
  5. Flavours are we looking at ? • Windows XP • Windows 7 • Windows 2003
  6. Two Types of Escalation • Admin to System – Easy , not much effort needed • User to System – Here is where the real deal lies in 
  7. Admin to System ( Piece of Cake ) • The famous “at” command • “psexec” anyone ?
  8. Demo
  9. System Privilege using “at”
  10. Pass the Hash • Managed to get the user hash • Password is complex will take long time to crack via rainbowtables • Boom Boom Pow.
  11. Abusing Scheduled Tasks • Admin creates a scheduler task with System privileges
  12. Abusing Scheduled Tasks • Sadly the file to be executed is accessible by everyone
  13. Demo
  14. Creds in Files • C:usersvictimDesktoppassword.xls • C:>dir /b /s web.config • C:>dir /b /s unattend.xml • C:>dir /b /s sysprep.inf • C:>dir /b /s sysprep.xml • C:>dir /b /s *pass* • Registries are also a good place to have a look at
  15. Weak Directory Permissions Lets have some fun
  16. Demo
  17. Abusing Service misconfigurations • Possible attack vectors ? – Editing the service config – Editing the binary path Todays Discusssion – Unquoted Service path Vulnerability
  18. Unquoted Service Path
  19. Unquoted Service Path • c:program*filessub*dirprogram*name • c:program.exe filessub dirprogram name • c:program filessub.exe dirprogram name • c:program filessub dirprogram.exe name
  20. Unquoted Service Path
  21. Unquoted Service Path
  22. Demo
  23. Editing Service Binaries • What are service binaries ? • How do we exploit them ? • Lets exploit upnphost of the Windows system a default servcice that runs
  24. Editing Service Binaries
  25. Editing Service Binaries
  26. Editing Service Binaries
  27. Demo
  28. Thank you • Questions ?