hacktricks/windows-hardening/checklist-windows-privilege-escalation.md

138 lines
11 KiB
Markdown
Raw Normal View History

# Orodha - Kupandisha Mamlaka ya Ndani kwa Windows
2022-04-28 16:01:33 +00:00
<details>
<summary><strong>Jifunze kuhusu udukuzi wa AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA USAJILI**](https://github.com/sponsors/carlospolop)!
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) za kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2022-04-28 16:01:33 +00:00
</details>
### **Zana Bora ya Kutafuta Vekta za Kupandisha Mamlaka kwa Windows:** [**WinPEAS**](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS)
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
### [Maelezo ya Mfumo](windows-local-privilege-escalation/#system-info)
2024-02-11 02:13:58 +00:00
* [ ] Pata [**Maelezo ya Mfumo**](windows-local-privilege-escalation/#system-info)
* [ ] Tafuta **mabao ya kernel** [**kwa kutumia hati za script**](windows-local-privilege-escalation/#version-exploits)
* [ ] Tumia **Google kutafuta** mabao ya kernel
* [ ] Tumia **searchsploit kutafuta** mabao ya kernel
* [ ] Maelezo ya kuvutia katika [**vars za mazingira**](windows-local-privilege-escalation/#environment)?
2024-02-11 02:13:58 +00:00
* [ ] Manenosiri katika [**historia ya PowerShell**](windows-local-privilege-escalation/#powershell-history)?
* [ ] Maelezo ya kuvutia katika [**vipimo vya mtandao**](windows-local-privilege-escalation/#internet-settings)?
* [ ] [**Madereva**](windows-local-privilege-escalation/#drives)?
* [ ] [**Udukuzi wa WSUS**](windows-local-privilege-escalation/#wsus)?
* [**AlwaysInstallElevated**](windows-local-privilege-escalation/#alwaysinstallelevated)?
### [Uorodheshaji wa Kuingiza Kwenye Kumbukumbu/AV](windows-local-privilege-escalation/#enumeration)
* [ ] Angalia [**Uorodheshaji** ](windows-local-privilege-escalation/#audit-settings)na [**WEF** ](windows-local-privilege-escalation/#wef)vipimo
2024-02-11 02:13:58 +00:00
* [ ] Angalia [**LAPS**](windows-local-privilege-escalation/#laps)
* [ ] Angalia ikiwa [**WDigest** ](windows-local-privilege-escalation/#wdigest)ipo
* [ ] [**Ulinzi wa LSA**](windows-local-privilege-escalation/#lsa-protection)?
* [**Guard ya Vitambulisho**](windows-local-privilege-escalation/#credentials-guard)[?](windows-local-privilege-escalation/#cached-credentials)
* [**Vitambulisho Vilivyohifadhiwa**](windows-local-privilege-escalation/#cached-credentials)?
* Angalia ikiwa kuna [**AV yoyote**](windows-av-bypass)
* [**Sera ya AppLocker**](authentication-credentials-uac-and-efs#applocker-policy)?
* [**UAC**](authentication-credentials-uac-and-efs/uac-user-account-control)
* [**Haki za Mtumiaji**](windows-local-privilege-escalation/#users-and-groups)
* Angalia [**haki za mtumiaji wa sasa**](windows-local-privilege-escalation/#users-and-groups)
* Je, wewe ni [**mwanachama wa kikundi cha kipekee**](windows-local-privilege-escalation/#privileged-groups)?
* Angalia ikiwa una [mojawapo ya vivuli hivi vimeamilishwa](windows-local-privilege-escalation/#token-manipulation): **SeImpersonatePrivilege, SeAssignPrimaryPrivilege, SeTcbPrivilege, SeBackupPrivilege, SeRestorePrivilege, SeCreateTokenPrivilege, SeLoadDriverPrivilege, SeTakeOwnershipPrivilege, SeDebugPrivilege** ?
* [**Vikao vya Watumiaji**](windows-local-privilege-escalation/#logged-users-sessions)?
* Angalia[ **nyumba za watumiaji**](windows-local-privilege-escalation/#home-folders) (upatikanaji?)
* Angalia [**Sera ya Nenosiri**](windows-local-privilege-escalation/#password-policy)
* Ni[ **nini ndani ya Ubao wa Kuchorea**](windows-local-privilege-escalation/#get-the-content-of-the-clipboard)?
2024-02-11 02:13:58 +00:00
### [Mtandao](windows-local-privilege-escalation/#network)
* Angalia **sasa** [**maelezo ya mtandao**](windows-local-privilege-escalation/#network)
* Angalia **huduma za ndani zilizofichwa** zilizozuiwa kwa nje
### [Mchakato Unaoendeshwa](windows-local-privilege-escalation/#running-processes)
* Mchakato wa faili za binaries [**faili na ruhusa za folda**](windows-local-privilege-escalation/#file-and-folder-permissions)
* [**Uchimbaji wa Nenosiri la Kumbukumbu**](windows-local-privilege-escalation/#memory-password-mining)
* [**Programu za GUI zisizo salama**](windows-local-privilege-escalation/#insecure-gui-apps)
* Pora vitambulisho na **mchakato wa kuvutia** kupitia `ProcDump.exe` ? (firefox, chrome, nk ...)
2024-02-11 02:13:58 +00:00
### [Huduma](windows-local-privilege-escalation/#services)
2024-02-11 02:13:58 +00:00
* [ ] [Je, unaweza **kurekebisha huduma yoyote**?](windows-local-privilege-escalation#permissions)
* [ ] [Je, unaweza **kurekebisha** **binari** inayo **tekelezwa** na huduma yoyote **?**](windows-local-privilege-escalation/#modify-service-binary-path)
* [ ] [Je, unaweza **kurekebisha** **usajili** wa huduma yoyote **?**](windows-local-privilege-escalation/#services-registry-modify-permissions)
* [ ] [Je, unaweza kutumia faida ya **njia ya huduma** isiyo na nukuu **?**](windows-local-privilege-escalation/#unquoted-service-paths)
2024-02-11 02:13:58 +00:00
### [**Programu**](windows-local-privilege-escalation/#applications)
2020-08-18 15:38:51 +00:00
2024-02-11 02:13:58 +00:00
* [ ] **Andika** [**ruhusa kwenye programu zilizosanikishwa**](windows-local-privilege-escalation/#write-permissions)
* [ ] [**Programu za Kuanza**](windows-local-privilege-escalation/#run-at-startup)
* **Madereva** [**Dhaifu**](windows-local-privilege-escalation/#drivers)
2020-08-18 15:38:51 +00:00
2024-02-11 02:13:58 +00:00
### [Udukuzi wa DLL](windows-local-privilege-escalation/#path-dll-hijacking)
* [ ] Je, unaweza **kuandika katika folda yoyote ndani ya PATH**?
* Je, kuna huduma inayojulikana ya binary ambayo **jaribu kupakia DLL yoyote isiyopo**?
* Je, unaweza **kuandika** katika **folda za binaries** yoyote?
### [Mtandao](windows-local-privilege-escalation/#network)
* [ ] Piga hesabu ya mtandao (kugawana, interfaces, njia, majirani, ...)
* [ ] Angalia kwa umakini huduma za mtandao zinazosikiliza kwenye localhost (127.0.0.1)
2020-08-19 09:14:23 +00:00
### [Mandaraka ya Windows](windows-local-privilege-escalation/#windows-credentials)
* [ ] [**Winlogon** ](windows-local-privilege-escalation/#winlogon-credentials)mandaraka
* [ ] [**Windows Vault**](windows-local-privilege-escalation/#credentials-manager-windows-vault) mandaraka unayoweza kutumia?
* [ ] [**Mandaraka ya DPAPI**](windows-local-privilege-escalation/#dpapi) yenye kuvutia?
* [ ] Nywila za mtandao zilizohifadhiwa [**kwenye mitandao ya Wifi**](windows-local-privilege-escalation/#wifi)?
* [ ] Taarifa yenye kuvutia kwenye [**mambo ya hivi karibuni ya RDP Connections**](windows-local-privilege-escalation/#saved-rdp-connections)?
* [ ] Nywila kwenye [**amri zilizotekelezwa hivi karibuni**](windows-local-privilege-escalation/#recently-run-commands)?
* [ ] [**Meneja wa Mandaraka ya Desktop ya Mbali**](windows-local-privilege-escalation/#remote-desktop-credential-manager) nywila?
* [ ] [**AppCmd.exe** ipo](windows-local-privilege-escalation/#appcmd-exe)? Mandaraka?
* [ ] [**SCClient.exe**](windows-local-privilege-escalation/#scclient-sccm)? Uwekaji wa DLL upande?
2024-02-11 02:13:58 +00:00
### [Faili na Usajili (Mandaraka)](windows-local-privilege-escalation/#files-and-registry-credentials)
2024-02-11 02:13:58 +00:00
* [ ] **Putty:** [**Mandaraka**](windows-local-privilege-escalation/#putty-creds) **na** [**funguo za mwenyeji wa SSH**](windows-local-privilege-escalation/#putty-ssh-host-keys)
* [ ] [**Funguo za SSH kwenye usajili**](windows-local-privilege-escalation/#ssh-keys-in-registry)?
* [ ] Nywila kwenye [**faili za bila usimamizi**](windows-local-privilege-escalation/#unattended-files)?
2024-02-11 02:13:58 +00:00
* [ ] Backup yoyote ya [**SAM & SYSTEM**](windows-local-privilege-escalation/#sam-and-system-backups)?
* [ ] [**Mandaraka ya Cloud**](windows-local-privilege-escalation/#cloud-credentials)?
2024-02-11 02:13:58 +00:00
* [ ] Faili ya [**McAfee SiteList.xml**](windows-local-privilege-escalation/#mcafee-sitelist.xml)?
* [ ] [**Nywila iliyohifadhiwa ya GPP**](windows-local-privilege-escalation/#cached-gpp-pasword)?
* [ ] Nywila kwenye [**faili ya usanidi wa Wavuti ya IIS**](windows-local-privilege-escalation/#iis-web-config)?
* [ ] Taarifa yenye kuvutia kwenye [**logi za wavuti**](windows-local-privilege-escalation/#logs)?
* [ ] Je! Unataka [**kuomba mandaraka**](windows-local-privilege-escalation/#ask-for-credentials) kwa mtumiaji?
* [ ] Taarifa yenye kuvutia [**ndani ya Bakuli la Taka**](windows-local-privilege-escalation/#credentials-in-the-recyclebin)?
* [ ] Usajili mwingine wenye [**mandaraka**](windows-local-privilege-escalation/#inside-the-registry)?
2024-02-11 02:13:58 +00:00
* [ ] Ndani ya [**Data ya Kivinjari**](windows-local-privilege-escalation/#browsers-history) (dbs, historia, alamisho, ...)?
* [**Utafutaji wa nywila wa jumla**](windows-local-privilege-escalation/#generic-password-search-in-files-and-registry) kwenye faili na usajili
* [**Zana**](windows-local-privilege-escalation/#tools-that-search-for-passwords) za kutafuta nywila kiotomatiki
### [Mikono Iliyovuja](windows-local-privilege-escalation/#leaked-handlers)
* [ ] Je! Una ufikiaji wa kifaa chochote cha mchakato ulioendeshwa na msimamizi?
### [Uigaji wa Mteja wa Mipira](windows-local-privilege-escalation/#named-pipe-client-impersonation)
* [ ] Angalia ikiwa unaweza kutumia hilo
2022-04-28 16:01:33 +00:00
<details>
<summary><strong>Jifunze kuhusu kuvamia AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kuvamia kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2022-04-28 16:01:33 +00:00
</details>