The Windows Startup folder may be targeted by an attacker to escalate privileges or perform persistence attacks. By adding an application to a startup folder or referencing it with a Registry run key, the application will execute upon user sign-in. This technique, known as Boot Logon Autostart Execution: Startup Folder, can allow the program to […]
Windows Privilege Escalation: Stored Credentials (Runas)
Stored Credentials Exploitation is a technique attackers use to increase privileges in Microsoft Windows. Therefore, it allows attackers to escalate their access by exploiting weaknesses in how credentials are stored within the system. Windows offers a wide range of fine-grained permissions and privileges for controlling access to its components, including services, files, and registry entries. […]
Windows Privilege Escalation: Weak Registry Permission
Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and registry entries. Exploiting Weak Registry Permissions is one technique to increase privileges. Table of Content Introduction Windows Registry Registry Hive Weak Registry Permission Prerequisite Lab Setup Abusing Weak Registry Services Enumerate Vulnerable Registry key […]
Windows Privilege Escalation: Unquoted Service Path
Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and registry entries. Exploiting Unquoted Service path is one technique to increase privileges. Unquoted Path or Unquoted Service path is reported as a critical vulnerability in Windows, such vulnerability allows an attacker to escalate the […]
Windows Privilege Escalation: Insecure GUI Application
In the series of Privilege escalation, till now we have learned that Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and registry entries. Today through applications we are going to exploit the privileges. Many GUI applications need higher privileges other than the current […]
Windows Privilege Escalation: Weak Services Permission
Windows Privilege Escalation: Weak Services Permission is a critical topic in cybersecurity, especially when dealing with Microsoft Windows environments. Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components, including services, files, and registry entries. Exploiting misconfigured services is one technique attackers use to increase privileges. Table of […]
Windows Privilege Escalation: SeImpersonatePrivilege
In this article on Windows Privilege Escalation SeImpersonatePrivilege, we will be showcasing the process of creating a lab environment on an IIS Server running a Windows Server 2019 machine. After setting the IIS server, we will be focusing on the usage of the SeImpersontePrivilege or “Impersonate a Client After Authentication” User Right Privileges to elevate […]
Linux Privilege Escalation: Python Library Hijacking
In this article, we will demonstrate another method of Escalating Privileges on Linux-based Devices by exploiting the Python Libraries and scripts. Table of Content Introduction Python Script Creation Method 1 [Write Permissions] Vulnerability Creation Exploitation Method 2 [Priority Order] Vulnerability Creation Exploitation Method 3 [PYTHONPATH Environment Variable] Vulnerability Creation Exploitation Conclusion Introduction In general, whenever […]
Windows Privilege Escalation: DnsAdmins to DomainAdmin
In this article, we will show how attackers can escalate privileges from DNSAdmins to Domain Admin in Windows environments and gain unauthorized access. We will show you a method for escalating privileges on Windows-based Devices when they contain a compromised user of the DnsAdmins Group. Table of Content Introduction Setting Up Enumeration Exploitation Indicator of […]
Windows Privilege Escalation: SeBackupPrivilege
In this article, we will shed light on some of the methods of Escalating Privilege on Windows-based Devices when it is vulnerable with the SeBackupPrivilege after getting the initial foothold on the device. Table of Content Introduction Setting Up Privilege on Windows 10 Testing Privilege on Windows 10 Exploiting Privilege on Windows 10 Setting Up […]