Open in app

Sign in

Write

Sign in

Nikhil Anand
Nikhil Anand

30 Followers

Home

About

Pinned

Windows Privilege Escalation — Token Impersonation (SeImpersonatePrivilege)

Introduction Any process that has this privilege can impersonate a token, but it won’t actually create it. A privileged token can be obtained from a Windows Service (DCOM) that performs an NTLM authentication against the exploit and then executes a process as SYSTEM. Exploit it with juicy-potato, RogueWinRM (needs winrm disabled)…

Red Team

4 min read

Windows Privilege Escalation — Token Impersonation(SeImpersonatePrivilege)
Windows Privilege Escalation — Token Impersonation(SeImpersonatePrivilege)
Red Team

4 min read


Sep 17

Windows Privilege Escalation — Unquoted Service Path

Introduction There are many service which have spaces in them and that is unquoted. First we have to find out how many services are running in our system , that we can process in runtime. $tasklist /svc Let’s take “AnyDesk” as an example, query the service . $sc qc AnyDesk As…

Red Teaming

4 min read

Windows Privilege Escalation — Unquoted Service Path
Windows Privilege Escalation — Unquoted Service Path
Red Teaming

4 min read


Sep 13

Windows Privilege Escalation — Service directory write based privesc (Method 2)

Service directory write based privesc — 2nd Method Before exploiting the service, we will create the vulnerable machine ourselves and perform the exploit. Copy the Lab Setup and Initial Access steps from previous blog: Windows Privilege Escalation — Service directory write based privesc Service directory write based privesc Let’s perform the window privilege escalation attack (Service directory write based privesc )

Active Directory

5 min read

Windows Privilege Escalation — Service directory write based privesc (Method 2)
Windows Privilege Escalation — Service directory write based privesc (Method 2)
Active Directory

5 min read


Sep 10

Windows Privilege Escalation — Service directory write based privesc

Service directory write based privesc Before exploiting the service, we will create the vulnerable machine ourselves and perform the exploit. Let’s Start Install any Remote desktop application, We will install “RustDesk” application, run the application once and close it. Lets check for any normal user account. $net user Then checking if the “test” user is…

Windows Priv Escalation

5 min read

Windows Privilege Escalation — Service directory write based privesc and Unquoted Service Path
Windows Privilege Escalation — Service directory write based privesc and Unquoted Service Path
Windows Priv Escalation

5 min read


Sep 8

Windows Privilege Escalation — Service binary path write-based privesc with Service Full Access

Service binary path write-based privesc with Service Full Access Before exploiting the service, we will create the vulnerable machine ourselves and perform the exploit. Let’s Start Install any Remote desktop application, We will install “Anydesk” , run the application once and close it. To check services in running condition in our system $tasklist /svc $sc qc <service-name> “AnyDesk” is…

4 min read

Windows Privilege Escalation — Service binary path write-based privesc with Service Full Access
Windows Privilege Escalation — Service binary path write-based privesc with Service Full Access

4 min read

Nikhil Anand

Nikhil Anand

30 Followers

Synopsys | CEH | CRTP | DANTE

Following
  • Arun Channaraju

    Arun Channaraju

  • akshay Jain

    akshay Jain

  • Akash Katare

    Akash Katare

  • Hamit CİBO

    Hamit CİBO

  • Mcar

    Mcar

See all (8)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams