7.6 Windows OS

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

14 hours 43 minutes
Video Transcription
Hello, everybody. Welcome to episode number 39 off the privilege Escalation Siri's when those operating systems, My name is Alejandro Gonna And I'll be your instructor for today's session.
The Learning Argha Tibbs off. The decision is to understand the concepts behind this technique and apply and secure the commands to gather information so we can actually escalate privileges in the Windows operating systems. So get let's get down to business shall way.
Let me just grab. Ah, well, will not be using that window. Uh, the Kali common line. I will be using windows directly, but we use to the shell just so
we can you can see another window. That is not Kali once again
thought him and just maybe put this in a bigger position. And that's it
s Oh, yeah. First, uh, let's you know
the starting point of this, you know, off gathering information for Windows is obviously the same as the asses the leanings, previews, modules and sessions You already have. Ah, lo privilege, shell or terminal. There's actually, you know, can't connect back to Ford. And
two, you're attacking machine, and you can actually connect today
victims machine. So, uh, initially will want to quickly gather some essential information so we can get, you know,
the footprint of the operating systems. You're in AA and, you know, I said the situation and see what's the best path to put forward. Remember that it is super easy to go down the rabbit hole
with no information you may gather. So what I'm trying to do with all these beauties is to give you all the information and all the commands and all the ideas you can think of
so you can first gather as much information as possible is just like the initial steps were performed in people in previous videos, like gathering all the information poor scanning everything. This is the same gathering as much information as you can from the victim's system
so you can actually put it together and see what's Beth Path and maybe combined two different information from two different systems or two different, you know,
techniques and and actually escalate villages successfully. So let's first, let's find out what operating systems you're connected to. I mean, maybe you already know that, but, you know, always dumping this information is really useful, so you can actually go to sister
system in full command
and, you know, loading hot fixing everything. They will give you all the information off this upper assistant. As you can see, he will also give you the hot chicks There are actually installed. I will show you more commands to actually tailored all this out. But maybe you want something specific. Like, for example, maybe
system beautiful, same command.
But you actually want to, you know,
fine String.
forward slash B
for Will lash for was Let's see.
And, you know, maybe we want to get the operating system name, for example. Or maybe also, we will also want to check. I don't know, let me see. Like, something like,
maybe they always version
so we can see it in the output. Something like that. You could Abia.
And again we wait for doubt, foot and yeah, we get the information we were looking for. Um, so this is kind of, you know, maybe with this information, remember or all trusted database for for exploits, which is exploitive, e
you could just simply copy that. And, you know, they always brush him specifically
and see if there's, you know, a privilege escalation exploit for that operates system or that colonel version Specifically, Uh, maybe it's a simple as that may be, just downloading that exploit and and actually just, you know,
get information from that O. R. Actually escalated privileges directly from that exploit will be good. And, you know, you can start your privileges collision process in that way. Uh, you know, uh,
they let me give you another idea. For example, if you want to see the hole's name, um, you know, maybe that could be something useful, like host name,
and, you know, simple is that maybe you already maybe you're you're really performing lateral movement or vertical movement. Ah, And you saw that name that was actually communicating with other machine, maybe to crown job or something like that.
So maybe you you really know that this machine is actually connecting to a web server.
Oh, or something like that. Or these users actually performing. I don't know, uh, queries to a database. You can actually go to the other, compromise its machines and actually start a listener and, you know, wait for disconnection or something like that. I don't know. I'm just giving you ideas so you can think of something that and you can actually, uh, who am I,
um, command. And it will leave the use of your actually connected to and you know, it will print the user You can actually have seen. You know, the whole of my command is not available in some Windows operating systems. Like they're all ones. I If I go to my windows explain machine that the one we use in other medias
If I tied like Matt, type that command, it will not work. So maybe you could do something different,
like echo the output off
They use her name
and, you know, close that one out, and it will give you that the same output.
So, um,
now we have these basic information we can least other user accounts on the on this machine and bu around useless information, you know, a bit more in detail. We can Maybe we can already see what they know. Alejandro gonna use her.
You know, maybe it's part off administrator group, which will be ideal, which in this case it is. You know,
I'm just giving you ideas. That's it, For example, Net users
and, you know, administrator, which is, What am I right now? Ah, for example, guests and something like that. And maybe waking when I list something specific, like
need users. Um, just, uh,
But they use for here
and, you know, see more information about this specific user.
You get the idea. You can't. You can list everything from that. You, sir, Um,
another command or another thing that you know that Well, no, Uh, we need to know about the user information's for the moment. Maybe
next we went, we went to list the network in that is that is in this machine. I mean, what's connected to this machine and what rules does it, you know, impose on those connections. So first, let's have a look at the, you know, available were interfaces and routing table. Like
the fame was I p config.
You know, some basic information we can therefore was lush all
I think. Ah, also, Dash will work. Yeah, um and you will give you more information that that the simple command I peek and feeble. Do you, um,
another thing that you can actually listen. There is a routing table. You can just type route
and then print
and he will give you the writing table. As you can see, this is really useful information again. Maybe you'll really sell the machine name connecting to another machine that you're really compromised. They will help you to actually. Now double check that. Or maybe see, that is actually connecting to another machine that you didn't have an idea off or something like that. I mean,
did you get the point? Or maybe you'll really compromised this machine. And while you're doing it's actually, uh,
for trying to perform a little movement or vertical moment. And you can use this technique as well to give you all this information. And you can also check the air p this place average resolution, protocol cash, for example, table for all the available interfaces. And this is a simple command as well.
Just air, Air P,
uh, dash A
and we'll leave you all these useful information. Maybe you want to perform air p poisoning or are poisoning attack, which is basically telling the router or the switch or whatever. You know, network device is in between
telling you that you actually have that Mac outer specifically So any package that will come to that router or, you know, stretch or whatever.
Um, you know, layer Thio devices in the network. Whatever comes that way, it will send to my i p or send it to me because I have that Mac address and that will be alike. Like maybe trying to perform a man in the middle attack or something like that. He will help you with that.
You know, that brings us thio the active network connections and fire Will rules are us always or nets that command
and dash in a n o b,
for example, it will give you all this information. Uh, with the B, for example,
we were this information, you know, just listing the active connections. For example, we can use net. Shh. You know, the following two Nets h commands A will show you our example of the man's They're not, you know, universal across every operating system. Maybe Osama Berry systems are different.
The firewalls maybe have a different configuration, or the operating system might be. I have replicated the command. For example,
in all versions, off windows, for example, you can just have a net a sage, firewall
and, um, show a state
net essay. Oh, Nate Net. It's a steep Wow Natu sage fire will. And he will give you some information about the fire will. But you know it will tell you that this is deprecate ID. So you can just type nets say nets h
on, then go to advance or a d B.
Uh, fire will. Well, not necessarily a bad ***, but, you know, a TV firewall, and then fire will.
And he will give you the information you're looking for. Um, you know,
maybe, you know, he's playing
play all the options,
This play, all the commands,
firewall, for example, Something like that.
And he will give you least of India, you know?
So, uh,
but for example, you can also type
net a sage.
Ah, fire will show. Come faith.
And he will give you more information about that.
you know, you can get all this from the fire. Well, maybe you are. You know, you're an administrator, user, but you want thio escalate thio the main controller use or something like that. You can actually change firewall settings or something. You can do it through this, command us well.
And finally I will take a brief. Look at the what is running
on the on this compromise machine. For example, as scheduled, task crime jobs, running processes, service is installed drivers and something like that, for example, off. Let me just type this command
for this. Will check this played, You know, the output off off all scheduled task. You know, Let me just type it so you can sit out. But here, so is h im sorry. Ch task
What did I do wrong?
A C h a s c h
tasks. Oh, forget about this
s at the end. Sorry. And as you can see, we'll have a pretty good deal of information here. Uh, maybe you're looking for something specific. You can always try to grab it, like, kind of a wreck. Command Elinor's. You can use a fine string
in windows, and you can see there's a lot of information in there. Uh, next you can actually use the command task list, um, to see the running processes again. Okay. Finally, it didn't
You can actually check, um,
that the ansari um
cast list
command seeking again. Check all the running processes
and, you know, we have a good deal of processes as well. Maybe I recall some time getting nowhere and the Polish escalation process. And I saw an anti virus software running as this process. Remember the name of the anti by Rudo.
But it was running in the night, You know, the list thing I thought that this device will help me
to escalate privileges. Well, inter sound that the anti virus had, ah, privilege, escalation, vulnerability. And I actually used that line ability to escalate through just so done. Discard any any service. Oh, our software running on the computer. You have to
may your investigation. And I know this sounds like a lot of work because it is
You will have to, you know, maybe check the service at what version of the service sexually running. Or you know, what version of this process of replication is running and you will have to actually search for privilege Escalation exploits as well. Um, next, just like another type that you could do you It's just
like net start,
and it will give you more information off of the processes and service is running this machine.
Um, for example, you can also, you know,
use query for third party drivers, even by you know, by companies that I actually have a reputation of being a security again, I use an anti virus suffered to actually escalated privileges. So again, take a closer look Awful. The service's and and and applications and processes running under on the machine,
for example. Um,
you know, let me just leave your command
driver query,
and again, it will give you a lot off information again. Don't discard. Like, for example, if you see Ah, for example, be little wife of Filtered. Um, I don't know, beautiful machine, boss. You can even you can even actually use the hyper visor.
You know, the one that is controlling the utilization of your machine.
You can actually use that as well as you can imagine. I'm using parlance to fertilize my machines, but, you know, maybe you're using on up box or I'm out.
bm or something like that. I can assure you. Yeah, if I go to two or are always useful,
let me just
grab the Saudi here
and let me just start here again. If I go to, uh, explode out of its and I go to something like being worth or something like that.
Ah, we will find a good deal of information exploits here or part of little son. I've bored, You know,
you'll find something. Bottle of remote application server by list that stop Burton machine escape. Okay, you can see that. I mean, you can jump from the host to the I'm sort of. From the guest, the host machine. I mean, yeah, you can maybe compromise the server.
That is Bert Wise. But you can jump to the ho to the host,
ah, machine or server and may be compromised the rest off the brutalized foreign server farm that they're holding in that machine. So that's a really good deal for you.
So that's the point. Dundee's don't discard any suffered any process, any service running. You have to make your homework and, you know, apply the techniques that we saw in the previous
modules for for leanings, which again you have to apply. Maybe they're obviously not the same commands,
but they are definitely the same idea. So you can actually get information from from this machine.
Uh, what is achieved by the command system in fourth? Well, as the names just it will give you all the information needed for you to um you know, find out more about the operating system you're running on in this case, Windows, obviously.
Ah, what is achieved with the command A S C H tasks? Well, it will print all the schedule task at the crime jobs you have on there under under operating on the windows books that you're actually trying to s college privilege.
Um, And this video, we'd learn the concepts behind this technique, and we implemented on executed some commands to help us escalate privileges. Supplemental materials muster. And Colleen is for a bass penetration test in, Uh, yeah, this is the same
buck that will we will use for both leaders and windows. And I believe this post from got milk, which is mainly focus on on Lena's privilege escalation. But it had some good pointers for, you know, for dis commands how to order them and how to actually
you can actually use them to your privilege, escalation advantage
and looking forward in an Expedia will cover the windows. The Windows management instrument station, Common line, a tool, you know, also known us. W m i c
Uh, yeah. I hope that's it for today, folks. I hope you enjoyed the video and talk to you soon.
Up Next
Offensive Penetration Testing

This is a deep course about penetration testing. In this course, you’ll learn from basic to the most advanced and modern techniques to find vulnerabilities through information gathering, create and/or use exploits and be able to escalate privileges in order to test your information systems defenses.

Instructed By