Security Researcher at Adobe, Chapter Leader at OWASP & null
Aug. 31, 2016•0 likes•2,237 views
1 of 28
Windows privilege escalation by Dhruv Shah
Aug. 31, 2016•0 likes•2,237 views
Download to read offline
Report
Internet
Different scenarios leading to privilege escalation
Design issues , implementation flaws, untimely system updates , permission issues etc
We ain’t talking about overflows here , just logics and techniques
What are we here for ?
• Different scenarios leading to privilege
escalation
• Design issues , implementation flaws,
untimely system updates , permission issues
etc
• We ain’t talking about overflows here , just
logics and techniques
Flavours are we looking at ?
• Windows XP
• Windows 7
• Windows 2003
Two Types of Escalation
• Admin to System
– Easy , not much effort needed
• User to System
– Here is where the real deal lies in
Admin to System
( Piece of Cake )
• The famous “at” command
• “psexec” anyone ?
Creds in Files
• C:usersvictimDesktoppassword.xls
• C:>dir /b /s web.config
• C:>dir /b /s unattend.xml
• C:>dir /b /s sysprep.inf
• C:>dir /b /s sysprep.xml
• C:>dir /b /s *pass*
• Registries are also a good place to have a look
at
Abusing Service misconfigurations
• Possible attack vectors ?
– Editing the service config
– Editing the binary path
Todays Discusssion
– Unquoted Service path Vulnerability
Unquoted Service Path
• c:program*filessub*dirprogram*name
• c:program.exe filessub dirprogram name
• c:program filessub.exe dirprogram name
• c:program filessub dirprogram.exe name
Editing Service Binaries
• What are service binaries ?
• How do we exploit them ?
• Lets exploit upnphost of the Windows system
a default servcice that runs