Hello, everybody. And welcome to episode number 41 off the privilege escalation Siri's when those obligation and service is my name is Alejandro Gonna and I'll be your instructor for today's session.
The learning operatives of the session is to understand the concepts behind this technique and also applied and execute commands to gather information so we can actually escalate privileges. So let's get down to business. Shall we Let me just grab or Windows based here.
And, you know, uh, our goal in this session is to use Wait. Permissions are to, you know, to elevate our privileges.
You know what permissions on application service is? Processes, folders, whatever that has worked. Permission Zobel use. It'll try to find those witnesses so we can actually escalate privileges. For example, we can start by checking. You know, we'll be checking a lot of access rights,
so we should grab a copy of the Axis
C h k, that ex execute herbal from the tool and, you know, tool from the cyst. Internal sweets. I just had this page up in here so you can, you know, see the link and unloaded. This is not by the fault with style in windows, which is, you know, a shame for Windows system administrators because it contains a lot of
cool features and tools
you can use. But, you know, it's also Paradies for for penetration testers, because at the end, whatever is used for good purposes, it is unfortunately used also for bad purposes. So, yeah, you know, ashamed for system administrators that it's not installed.
I didn't also ashamed for
penetration testers that we can actually leverage the functionalities in this says internals. Sweet. You know.
Yeah, well, I already downloaded. Here. Let me just go to that folder
so you can actually see here, but I'm talking about
Um, cece Insurance hopes this stuff,
and as you can see, eat contains a lot of tools. Ah,
you know, P s exact. They want the famous one p s ex sec, and, you know, it contains a lot off tools the one will be using right now. Eyes that access C h k. You know, just fool again from since internals, um, you know, we'll be using that to actually check permissions, but let me start
checking the window service. Is there some quick wings to be found here. For example, nowadays, Windows system won't contain both. Honorable service is per se. I mean, you know, you have to check. Um, either way. For example, there was something called Golden Ticket,
which is what's exploited, really? Also exploit I you know,
you can google it and see what it's looked like. I believe there are some X P machines are still out there, you know, nowadays is mostly Windows 10 Windows eight. And you know, this is not longer vulnerable to this golden ticket exploit. Unless the society mean it's really, really
I don't wanna use some bad word here, but, you know, you get the idea
s Oh, yeah, that's first double checking. The service is I will be used the S e Q c spolar, the S E. You know, tool can be used to query, you know, car figure and manage. Window service is so sc absurd. Que si
And we'll see some useful information here, like, you know, the finally path. Name something like that. Notice, order group. You know, you could data. You can see a lot of information. We can see permissions that its user level has
you can you know we'll use Ah, the access C h k uh,
tool. I get again from the cyst. Internals, guys, this will not again being stalled by default in windows. So let me just
access C h k. You know, Dash, uh, you see Q b
and you know, schooler
and we'll see more, more. Um,
um, tools in here service our access, you know, building administrators. I can't figure this by the fall on purpose, eh? So we can actually, you know, see how noah vulnerable service like, Well, looks like, you know, reading right.
I will be seeing administrators on and off.
All has access to it, you know? You know, you can
actually get different permissions when you're actually elevating your privileges. But that's it. That's the idea. With the access T c h k a tool, you can automatically check if we can. Right now we have right accesses. The window service is
ah, would Sir Tain user
again? Well, you do have in this case, but you know, you can check that You can also
check, uh, using access ch gate for regrettable folders and files. Like for example, Let me just write the commanding here once again. Such. Okay, let me just raise this thk uh,
you the Lucy Q b, for example. You can actually check all all these flags, but just using the question mark, and that will be it. I mean, just check for, for example, authenticated
and see what comes from no match. No matching objects found. That's okay. We Can you just check different things? Like
I don't know. For example, everyone
modified these flags. Like, for example, I don't want to use that like you tell us. You,
all the all the flags again. You can actually check the flags, Let me
leave the same flax and changed the user instead. But you can take other flags for other options. Simple users in here
on objects. Much found. That's OK. That's idea. Woo, run this commands to see if we catch the right to something. And, for example, you can actually check with service's permissions. Maybe we can. We can reconfigure anything. Um,
for example, let me change flax. This time you don't leave c Q B
and no much found. Maybe everyone
no, no much found. That's OK, that's the point. Will need to actually check for those to see if this is kind of the sticky bit version off the linens, operator system, dedicated users
and how much has found. The point is that you can actually search for all this commands informations to see if we can find something you, uh you know, by reconfiguring the service's we can run any binary that we choose and, you know, get the privileges collection process Don.
Now our show, unfortunately, power shell is not a thing in escalating privileges because most of the time is not installed or maybe not installed, but not enable or not fully enabled on the Windows operating system. And if it is,
uh, it's not us. Allow privileged user are now allowed to to use it. Or, you know, maybe it's not enable and you're not allowed to enable it, because you will have to, you know,
have administrative permissions to actually elevate privileges. But the power shell is actually really powerful of if, for some reason it's enabled, you can just fire a shell. Ah, but you know, even even after you escalated privileges, I have the recommended to use Barbara shell
again, it will. It will. It will give you a lot of information. Like we're really are, Um
um super user. You know, our administrators in here. And by the way, uh,
let's are made this by using this script.
This script is really cool. You can No. You can learn to use power shell and perform test manually. But as I show you in the Olympics privilege escalation module, we also have, ah, kind of, ah ah, script or, you know, a powershell script
seeking executed and get more information.
So let me just give you a run. Just copy that link here. Just copy base here into into into Ah, I really did. It is located here, you know, test
that p s one on. And you just have to go for the power shelf.
shell, by the way. And, you know, just city desk top by the way again. This is not, you know, like enable. But if all you have thio, use the a set dash execution policy command up our shell command to actually enable this,
and obviously you have to be administrated to enable that. So
you know, that's where the problem resized to use Baur Shell to escalate village. Now, after you have escalated privileges, running power shell is like one of the main things you have to do is at the end. As I told you in in previous videos,
after your privilege escalation process, you still have to enumerate all the system because maybe you were unable to find information as ah lo privilege you, sir. But now that you have administrative privileges, you may be fine, although useful information to go to another machine
too. You know, maybe, you know, you know, read basil words from other machines, especially
when you're actually like
trying to escalate privileges. And you have, uh,
being able to actually
create exploits for for the privilege escalation and you're inside.
for example, domain controller, which will contain all the credentials for all the people. Maybe you were unable to to find sensitive information. A silo privilege you, sir. But you know, now that your administrator, you might be able to actually find
good some goodies so you can actually go to another machine. So yeah, we're in a powerful up. I'm sorry. Power shall exploit
Oh, our script in this case, you know, there's tons off information you can find on Google, But, you know, this script will automate the process, and it will give you some useful information. Uh,
for example, if I just let me give you an example that I'm talking about to enable its shell script if I'm here and I said set
dash execution policy, and I put it like a now remarked Signed?
it will give me Ah, you know, uh, an exception, because I'm not, um, administrator is denied to changed execution policy for the fall of machine scope store Windows Publisher in the run administrator option. Okay, I'm not administrators of How could I do that? That's the problem.
But now that we're administrators, you can actually simple just run this script,
And it will give us, you know, all the information that I have been showing you so far. But you know, it will automate it for us, and it will give you some
maybe pointers where we can actually go to and in the scripts. And, you know, uh, maybe see, we can actually find out how we can actually escalate religious like, let me go to the beginning. Off script. And again, remember the hot fixes. This is just basically executed the system information command system in Foca, man.
And you know, we'll see a lot of finishing here.
Never Information. What? Stick? The card that we're using. The servers are peacock cache table. Remember that we saw all these commands in our previous video for Windows Privilege escalation, routing table network connections, connected drivers.
For example. If we haven't s and B
service running the school beaver useful firewall configuration, maybe the fire will We can find it. Find out if if if the fire well, it's actually blocking incoming connection, but not is not blocking outgoing connection. So maybe we can do that. Something Something without information.
Current user use for privileges. Obviously, I'm you know, again, administrator.
Local users locked in users. Credential. Meijer.
You know, we can find a lot of information here. Processes running processes. Maybe again. I told us I told you the previous video. Isom some some back in the day I used
actually an activator southward to escalate privileges, so yeah, don't discard any anything crazy that you see here somewhere Registry for example, Uh, and you get the idea
you can actually see that, for example, is startup commands. You actually try to change or, you know, override some of them, See if you can actually run it. When administrative privileges, something like that. You get the idea
what is achieved by the command S C. Q C spolar. Well, as I told you at the beginning of the video, the Sikh command is used to query comfort your or manage when the service is soap. This case were checking that service. What is Ah, chamber the command Access C H K.
Well, this is Ah, sis. Internal sweet command or tool
again, it's not enabled by the following windows. You have two downloaded. So if you don't actually have permissions to download it to cer tain folders, you will have to check with folders you have permissions to and maybe download. This is internal tools in allocation.
Andi stole these used torno check accesses,
checked permissions that you have, maybe for all the users or for your specific users for processes, service's folders, applications and everything. So this is really cool applications up again. It's not enable or not. Is not downloaded by default windows.
In this video, we learned the concepts behind this technique. Hang we implemented on executed some commands to help us escalate privileges.
Supplements materials again. Mustering Caroline is with advance penetration test in and fast security windows. Privilege Escalation.
Looking forward in the next video, we'll cover module. ADA will start with module eight, which is basically a penetration testing simulation exercise will cover from the better beginning. I mean, from from, you know, pre engagement things like getting the contract signed, what could kind of contract. You have to get
what kind of report you may have 2% maybe defining the scope
and we'll, you know, go through the entire process until we actually have to, you know, percent the final findings and, you know, everything that is in the Middle East basically just exploited vulnerabilities in getting remote command remote control on the machines.
Well, that's it for today, folks. I hope you enjoyed the Bay Area and talk to you soon.