πͺCitrix Breakout
π― Overview
π Basic Breakout Methodology
Three-Step Process
1. Gain access to a Dialog Box
2. Exploit the Dialog Box to achieve command execution
3. Escalate privileges to gain higher levels of accessEnvironment Characteristics
# Highly restrictive environments typically have:
- No cmd.exe/powershell.exe in Start Menu
- Blocked access to C:\Windows\system32 via File Explorer
- Group policy restrictions on directory browsing
- File Explorer access restrictions to sensitive pathsπ Bypassing Path Restrictions
Dialog Box Methodology
MS Paint Dialog Box Example
UNC Path Technique
π SMB Share Access from Restricted Environment
Setting up SMB Server
Accessing SMB Share via Dialog Box
Custom Breakout Binary
π οΈ Alternate File System Tools
Explorer++ Bypass
Alternative File Managers
ποΈ Alternate Registry Editors
Registry Editor Bypass
Registry Editor Features
π Modifying Existing Shortcuts
Shortcut Hijacking Process
Creating New Shortcuts
π Script Execution Bypass
Batch File Method
Script Extension Exploitation
πΊ Privilege Escalation in Citrix
AlwaysInstallElevated Discovery
PowerUp MSI Exploitation
User Creation via MSI
Runas for New User Context
π‘οΈ UAC Bypass
UAC Bypass Necessity
Bypass-UAC Script Usage
Verification of Bypass
π― HTB Academy Lab Solutions
Lab Environment
Lab 1: User Flag (pmorgan Downloads)
Lab 2: Administrator Flag
π Complete Attack Chain
Comprehensive Breakout Process
π οΈ Required Tools
Essential Breakout Tools
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Last updated