SlideShare a Scribd company logo
1 of 14
1
Windows Local Escalation
Privilege
Escalation
Windows Privileges
Accessing the NT Authority account on a
Windows system can be a bit troublesome.
When performing local escalation, the
objective will be to add an Administrator
account.
Regular User
The most basic type of access an account can
have in a given system, the regular user will
usually have access solely to his files and
applications, but to none of the other system
settings or directories.
NT Authority
The most privileged account on the local
system, this account has access to all system
settings and directories, including more low-
level data.
Admin
The “privileged” account of the local system.
The Administrator account will also have
access to all of the regular users’ data, but
will still be restricted from some lower-level
system settings.
2
Domain Privileges
Despite the privileges administrators in a
domain have, they do not have privileges over
locally created content.
Delegated Admin
The delegated administrators will typically be
users in charge of controlling and enforcing
certain roles and features and will usually
have limited privileged permissions.
Enterprise Admin
In the case of enterprise administrators,
those users have permissions regarding the
entire ecosystem of the organization.
Domain Admin
Users with administrative domain
permissions are those with the highest
permission in the domain scope.
3
Windows Boot Process
MBR
The basic input/output system, also known
as the BIOS, executes the master boot
record, which in turn, executes the boot
bootloader code.
Kernel
The kernel is the first program to load after
the bootloader. It takes part in loading the
operating system and establishing
communication with input and output
devices.
Run Level
The run level operations are those with
deprived permissions. After the system has
been booted and a user logs in, all NT
Authority’s privileges are no longer required.
Winlogon
Winlogon is considered to be the father of all
processes in an operating system. It is also
responsible for limiting privileges when a
user logs in.
Windows Bootloader
The windows bootloader is responsible for
loading the operating system itself and when
interrupted, it can choose where to boot
from or with what configuration.
Run level
Kernel
MBR
bootloader
winlogon
4
1
2
3
4
5
5
The Trick
Digital Signature
A mathematical scheme used for authentication of digital messages or files. The digital signature verifies the identity of the
file creator and the integrity of the data. Without these 2 elements, the file’s credibility cannot be trusted. Unfortunately,
winlogon does not verify a digital signature and might be vulnerable to file substitution.
Below are some common programs that can be launched with winlogon without verification:
PROGRAM PURPOSE LOCATION
Sticky Keys It helps disabled users make the ctrl, windows and alt keys
”stick,” so they can be pressed one key at a time, instead of
needing to press all of them simultaneously .
Windows/system32/sethc.exe
Magnify It helps disabled users view different sections of the screen in
a magnified window.
Windows/system32/magnify.exe
Ease of Access A utility that enables multiple disability-friendly features to
help disabled users with computer usage.
Windows/system32/utilman.exe
Logon Options
When at the logon window, Windows
allows several execution programs:
• Sticky Keys – by pressing the ‘shift’
key 5 times
• Magnify – by pressing the ‘winkey++’
• Ease of Access – by clicking on the
disability icon on the lower left
Because these programs execute before
privileges are limited, they run as NT
Authority.
6
Live System
Unlike the local escalations on Linux
systems, in order to preform a successful
privilege escalation on a Windows
system, we will need any live OS:
• Linux
• Windows Rescue CD
• Hiren’s Boot CD
When operating through a live system,
all computer resources are available,
but the data of the live OS is not saved
to the original OS.
7
8
Choosing Tools
Live OS
Live OS comes in many variations and most technicians and Pen Testers carry one in hand. For the sake of local PE on a
Windows machine, the OS is not of importance as long as it can mount the hard drive. Usually, the choice will be a Linux OS
or Hiren’s boot CD because a Windows rescue CD will work only for that specific version.
Below are the common live OS options and the pros and cons of each:
OS PROS CONS
Linux Distro CD Can be booted on almost all systems Requires some knowledge of using a Linux
operating system
Hiren’s Boot CD Includes many ‘minified’ live OS including
Linux and mini Windows XP
The ‘minified’ systems can restrict some advanced
functionalities
Windows Rescue CD Can help with native Windows errors Might not work on different versions of Windows
other than the one it belongs to
Mounting the Drive
After a successful boot to the live
system, the original OS’s hard drive still
needs to be loaded in order to provide
access to the system files.
If the live system is a Windows repair
CD, the drive will be mounted
automatically under the original letter
‘C:’.
The recovery command prompt is
available through the advanced recovery
options.
9
WINDOWS
The command prompt is launched at ‘X:’ which is the
rescue CD. Type C: to change to the system drive.
The OS location can be checked with the command
bcdedit | find "osdevice".
Navigation within folders is done with dir and cd.
Copying and overwriting files is done with copy.
LINUX
On Linux live OS, some manual searching is done with
the lsblk.
When identified, the drive can be mounted manually
with mount [drive] [mount location].
Navigation within folders is done with ls and cd.
Copying and overwriting files is done with cp and mv.
10
Mounting the Drive
Replacing the Files
Having mounted the original OS files,
the next step is to change one of the
target programs with the cmd.exe
program.
There are a few more target programs
that can be used in addition to the ones
mentioned. They are located at
‘C:WindowsSystem32’.
It is highly recommended to make a
backup of the original files before
overwriting them.
11
Result
After swapping the files and rebooting
the system, when again at the logon
window, now there is a slight difference.
If an attempt to launch the replaced
target program is made, ‘cmd.exe’ will
be launched instead.
Being launched by winlogon, the
command prompt will have escalated
privileges.
12
Adding a User
When within a command prompt, the
following commands are used to create
a user with administrative privileges for
further use:
• net user [username] [password] /add
– creates a user with the given name
and password
• net localgroup administrators
[username] /add – adds the user to
the administrators group
If all steps are executed correctly, a new
privileged user will be present on the
system.
13
Means of Protection
Encryption can be achieved with either
external tools like ‘Veracrypt’ or internal
systems like ‘BitLocker’.
BIOS Password
Setting a Bios password may protect the
computer from having its boot order
changed. Unfortunately, if the CMOS battery
is taken out, the password is canceled.
Restrict Access
More of a precautionary step than a security
method: never leave a computer unattended
or in an easily accessible area. In most cases,
this is not an enforceable option.
Encrypt Drive
Encrypting the hard drive is likely the better
option because it will prevent the ability to
read or write to the drive from an external
live OS.
14

More Related Content

What's hot

Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Vibhanshu Chaturvedi
 
I B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CSI B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CSHepsijeba
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programmebbp2067
 
Introduction To Windows Xp Class 1
Introduction To Windows Xp   Class 1Introduction To Windows Xp   Class 1
Introduction To Windows Xp Class 1puter_geeket
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshanravish roshan
 
History of Windows
History of WindowsHistory of Windows
History of WindowsNiraj Bariya
 
Lesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsLesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsGene Carboni
 
2nd lesson installing operating system
2nd lesson installing operating system2nd lesson installing operating system
2nd lesson installing operating systemRaiza Janelle
 
Windows Xp Presentation Downing
Windows Xp Presentation  DowningWindows Xp Presentation  Downing
Windows Xp Presentation DowningIWCS
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7elboob2025
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Gene Carboni
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGene Carboni
 
Windows 11 what are some big features, upgrades & changes
Windows 11 what are some big features, upgrades & changesWindows 11 what are some big features, upgrades & changes
Windows 11 what are some big features, upgrades & changesadix1
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Gene Carboni
 
Windows 7 project.pptx
Windows 7 project.pptxWindows 7 project.pptx
Windows 7 project.pptxTea Trebicka
 
Microsoft windows operating system
Microsoft windows operating systemMicrosoft windows operating system
Microsoft windows operating systemTEENAVEENCHHEE
 

What's hot (20)

Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
 
Windows xp install
Windows xp installWindows xp install
Windows xp install
 
I B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CSI B.Sc C & HA - Basics of CS
I B.Sc C & HA - Basics of CS
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
Introduction To Windows Xp Class 1
Introduction To Windows Xp   Class 1Introduction To Windows Xp   Class 1
Introduction To Windows Xp Class 1
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshan
 
History of Windows
History of WindowsHistory of Windows
History of Windows
 
Lesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System ConfigurationsLesson 2 - Understanding Operating System Configurations
Lesson 2 - Understanding Operating System Configurations
 
2nd lesson installing operating system
2nd lesson installing operating system2nd lesson installing operating system
2nd lesson installing operating system
 
How to install windows 7 operating system
How to install  windows 7 operating system How to install  windows 7 operating system
How to install windows 7 operating system
 
Windows Xp Presentation Downing
Windows Xp Presentation  DowningWindows Xp Presentation  Downing
Windows Xp Presentation Downing
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 
Installing Operating System
Installing Operating System Installing Operating System
Installing Operating System
 
Windows 11 what are some big features, upgrades & changes
Windows 11 what are some big features, upgrades & changesWindows 11 what are some big features, upgrades & changes
Windows 11 what are some big features, upgrades & changes
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
 
Ch11
Ch11Ch11
Ch11
 
Windows 7 project.pptx
Windows 7 project.pptxWindows 7 project.pptx
Windows 7 project.pptx
 
Microsoft windows operating system
Microsoft windows operating systemMicrosoft windows operating system
Microsoft windows operating system
 

Similar to File windows local

IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11blusmurfydot1
 
To pass ite chapter 5 exam
To pass ite chapter 5 examTo pass ite chapter 5 exam
To pass ite chapter 5 examAhmed Abdullah
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.pptJunaidAkbar37
 
Sistemas operativos
Sistemas operativosSistemas operativos
Sistemas operativos3022359
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XPRohan Bhatkar
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptxLINDYLGERAL
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptxOnyemaobiAmarachi
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxPoornimaGhodke3
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2mariacalji
 
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxModern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxraju957290
 
computer software in Computer Fundamentals
computer software in Computer Fundamentalscomputer software in Computer Fundamentals
computer software in Computer FundamentalsARDEN16
 

Similar to File windows local (20)

IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
 
To pass ite chapter 5 exam
To pass ite chapter 5 examTo pass ite chapter 5 exam
To pass ite chapter 5 exam
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.ppt
 
Sistemas operativos
Sistemas operativosSistemas operativos
Sistemas operativos
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Windows vs linuxe
Windows vs linuxeWindows vs linuxe
Windows vs linuxe
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
OPERATING SYSTEM.pptx
OPERATING SYSTEM.pptxOPERATING SYSTEM.pptx
OPERATING SYSTEM.pptx
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxModern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Computer software
Computer softwareComputer software
Computer software
 
computer software in Computer Fundamentals
computer software in Computer Fundamentalscomputer software in Computer Fundamentals
computer software in Computer Fundamentals
 
Intro xp linux
Intro xp linuxIntro xp linux
Intro xp linux
 
Lecture10.pptx
Lecture10.pptxLecture10.pptx
Lecture10.pptx
 

More from yarden hanan

Introduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineeringIntroduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineeringyarden hanan
 
Android Package tool
Android Package toolAndroid Package tool
Android Package toolyarden hanan
 
Introduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineeringIntroduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineeringyarden hanan
 
Introduction To Malware Analysis & Reverse Engineering
Introduction To Malware Analysis & Reverse EngineeringIntroduction To Malware Analysis & Reverse Engineering
Introduction To Malware Analysis & Reverse Engineeringyarden hanan
 
File windows local
File windows localFile windows local
File windows localyarden hanan
 
Linux automated tasks
Linux automated tasksLinux automated tasks
Linux automated tasksyarden hanan
 
Windows post exploitation
Windows post exploitationWindows post exploitation
Windows post exploitationyarden hanan
 

More from yarden hanan (16)

Introduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineeringIntroduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineering
 
SSL Pinning
SSL PinningSSL Pinning
SSL Pinning
 
Mobile SF
Mobile SFMobile SF
Mobile SF
 
iOS Jail break
iOS Jail breakiOS Jail break
iOS Jail break
 
Ios vs android
Ios vs androidIos vs android
Ios vs android
 
Android Package tool
Android Package toolAndroid Package tool
Android Package tool
 
Android package
Android packageAndroid package
Android package
 
Adb
AdbAdb
Adb
 
Introduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineeringIntroduction to malware analysis & reverse engineering
Introduction to malware analysis & reverse engineering
 
Introduction To Malware Analysis & Reverse Engineering
Introduction To Malware Analysis & Reverse EngineeringIntroduction To Malware Analysis & Reverse Engineering
Introduction To Malware Analysis & Reverse Engineering
 
File windows local
File windows localFile windows local
File windows local
 
Linux automated tasks
Linux automated tasksLinux automated tasks
Linux automated tasks
 
Windows advanced
Windows advancedWindows advanced
Windows advanced
 
Linux remote
Linux remoteLinux remote
Linux remote
 
Linux local
Linux localLinux local
Linux local
 
Windows post exploitation
Windows post exploitationWindows post exploitation
Windows post exploitation
 

Recently uploaded

VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...vinbld123
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptSURYAKANTSAHDEO
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一A SSS
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一F La
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 

Recently uploaded (20)

VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 

File windows local

  • 2. Windows Privileges Accessing the NT Authority account on a Windows system can be a bit troublesome. When performing local escalation, the objective will be to add an Administrator account. Regular User The most basic type of access an account can have in a given system, the regular user will usually have access solely to his files and applications, but to none of the other system settings or directories. NT Authority The most privileged account on the local system, this account has access to all system settings and directories, including more low- level data. Admin The “privileged” account of the local system. The Administrator account will also have access to all of the regular users’ data, but will still be restricted from some lower-level system settings. 2
  • 3. Domain Privileges Despite the privileges administrators in a domain have, they do not have privileges over locally created content. Delegated Admin The delegated administrators will typically be users in charge of controlling and enforcing certain roles and features and will usually have limited privileged permissions. Enterprise Admin In the case of enterprise administrators, those users have permissions regarding the entire ecosystem of the organization. Domain Admin Users with administrative domain permissions are those with the highest permission in the domain scope. 3
  • 4. Windows Boot Process MBR The basic input/output system, also known as the BIOS, executes the master boot record, which in turn, executes the boot bootloader code. Kernel The kernel is the first program to load after the bootloader. It takes part in loading the operating system and establishing communication with input and output devices. Run Level The run level operations are those with deprived permissions. After the system has been booted and a user logs in, all NT Authority’s privileges are no longer required. Winlogon Winlogon is considered to be the father of all processes in an operating system. It is also responsible for limiting privileges when a user logs in. Windows Bootloader The windows bootloader is responsible for loading the operating system itself and when interrupted, it can choose where to boot from or with what configuration. Run level Kernel MBR bootloader winlogon 4 1 2 3 4 5
  • 5. 5 The Trick Digital Signature A mathematical scheme used for authentication of digital messages or files. The digital signature verifies the identity of the file creator and the integrity of the data. Without these 2 elements, the file’s credibility cannot be trusted. Unfortunately, winlogon does not verify a digital signature and might be vulnerable to file substitution. Below are some common programs that can be launched with winlogon without verification: PROGRAM PURPOSE LOCATION Sticky Keys It helps disabled users make the ctrl, windows and alt keys ”stick,” so they can be pressed one key at a time, instead of needing to press all of them simultaneously . Windows/system32/sethc.exe Magnify It helps disabled users view different sections of the screen in a magnified window. Windows/system32/magnify.exe Ease of Access A utility that enables multiple disability-friendly features to help disabled users with computer usage. Windows/system32/utilman.exe
  • 6. Logon Options When at the logon window, Windows allows several execution programs: • Sticky Keys – by pressing the ‘shift’ key 5 times • Magnify – by pressing the ‘winkey++’ • Ease of Access – by clicking on the disability icon on the lower left Because these programs execute before privileges are limited, they run as NT Authority. 6
  • 7. Live System Unlike the local escalations on Linux systems, in order to preform a successful privilege escalation on a Windows system, we will need any live OS: • Linux • Windows Rescue CD • Hiren’s Boot CD When operating through a live system, all computer resources are available, but the data of the live OS is not saved to the original OS. 7
  • 8. 8 Choosing Tools Live OS Live OS comes in many variations and most technicians and Pen Testers carry one in hand. For the sake of local PE on a Windows machine, the OS is not of importance as long as it can mount the hard drive. Usually, the choice will be a Linux OS or Hiren’s boot CD because a Windows rescue CD will work only for that specific version. Below are the common live OS options and the pros and cons of each: OS PROS CONS Linux Distro CD Can be booted on almost all systems Requires some knowledge of using a Linux operating system Hiren’s Boot CD Includes many ‘minified’ live OS including Linux and mini Windows XP The ‘minified’ systems can restrict some advanced functionalities Windows Rescue CD Can help with native Windows errors Might not work on different versions of Windows other than the one it belongs to
  • 9. Mounting the Drive After a successful boot to the live system, the original OS’s hard drive still needs to be loaded in order to provide access to the system files. If the live system is a Windows repair CD, the drive will be mounted automatically under the original letter ‘C:’. The recovery command prompt is available through the advanced recovery options. 9
  • 10. WINDOWS The command prompt is launched at ‘X:’ which is the rescue CD. Type C: to change to the system drive. The OS location can be checked with the command bcdedit | find "osdevice". Navigation within folders is done with dir and cd. Copying and overwriting files is done with copy. LINUX On Linux live OS, some manual searching is done with the lsblk. When identified, the drive can be mounted manually with mount [drive] [mount location]. Navigation within folders is done with ls and cd. Copying and overwriting files is done with cp and mv. 10 Mounting the Drive
  • 11. Replacing the Files Having mounted the original OS files, the next step is to change one of the target programs with the cmd.exe program. There are a few more target programs that can be used in addition to the ones mentioned. They are located at ‘C:WindowsSystem32’. It is highly recommended to make a backup of the original files before overwriting them. 11
  • 12. Result After swapping the files and rebooting the system, when again at the logon window, now there is a slight difference. If an attempt to launch the replaced target program is made, ‘cmd.exe’ will be launched instead. Being launched by winlogon, the command prompt will have escalated privileges. 12
  • 13. Adding a User When within a command prompt, the following commands are used to create a user with administrative privileges for further use: • net user [username] [password] /add – creates a user with the given name and password • net localgroup administrators [username] /add – adds the user to the administrators group If all steps are executed correctly, a new privileged user will be present on the system. 13
  • 14. Means of Protection Encryption can be achieved with either external tools like ‘Veracrypt’ or internal systems like ‘BitLocker’. BIOS Password Setting a Bios password may protect the computer from having its boot order changed. Unfortunately, if the CMOS battery is taken out, the password is canceled. Restrict Access More of a precautionary step than a security method: never leave a computer unattended or in an easily accessible area. In most cases, this is not an enforceable option. Encrypt Drive Encrypting the hard drive is likely the better option because it will prevent the ability to read or write to the drive from an external live OS. 14