2.0 KiB

Windows Privilege Escalation Commands

Command that can be executed from the context of a shell prompt that help escalate or increase attacker privilege of the target.

  • UAC - How to bypass UAC.

General Commands

at (Scheduler)

  • Command with arguments: at [TIME] [cmd]
  • Description: This command can be used locally to escalate privilege to SYSTEM or be used across a network to execute commands on another system.
  • Examples:

Service security

Unquoted service names

Services with unquoted binary paths may allow privilege escalation.

  • Assume ServiceA refers to the unquoted path C:\Program Files\Some Service\service.exe
  • Service is started with desirable privileges (e.g. domain, SYSTEM)
  • If attacker can create files as c:\Program.exe or ''c:\Program Files\Some.bat'' the next time the service starts the attacker controlled binary will execute

Tools

  • Windows Privesc Check
  • Windows Privesc Check 2.0
    • Python + PyInstaller
    • Code is still very hard to maintain
    • Still painful to use on non-English systems
  • PowerUp
    • Smart PowerShell cmdlets (you can run these at remote hosts also!)
    • Offensive approach
    • Checks only the privileges of the executing user
  • WPC-PS
    • PowerShell
    • Tends to check privileges for all accounts (thus identifying potential targets for privesc)
    • Still experimental