π¨οΈPrint Operators
π― Overview
Print Operators group grants SeLoadDriverPrivilege, allowing members to load device drivers. This privilege can be exploited to load malicious drivers like Capcom.sys for SYSTEM privilege escalation.
π Key Privileges & Capabilities
# Print Operators privileges:
SeLoadDriverPrivilege # Load and unload device drivers
SeShutdownPrivilege # Shut down Domain Controller
# Plus: manage printers, log on locally to DCπ§ Driver Loading Exploitation
Privilege Verification
# Check privileges (may need UAC bypass first)
whoami /priv
# Expected output:
SeLoadDriverPrivilege Load and unload device drivers DisabledCapcom.sys Driver Attack
1. Registry Configuration
2. Enable Privilege & Load Driver
3. Exploit Driver for SYSTEM
π― HTB Academy Lab Solution
Lab Environment
Credentials:
printsvc:HTB_@cademy_stdnt!Access Method: xfreerdp
Tools Location:
C:\Tools\andC:\Tools\ExploitCapcom\Objective: Escalate to SYSTEM and retrieve flag from Administrator desktop
Flag:
Pr1nt_0p3rat0rs_ftw!
Detailed Walkthrough
1. Connect via RDP
2. Open Elevated Command Prompt
3. Navigate to Tools and Execute EoPLoadDriver
4. Navigate to ExploitCapcom Directory
5. Retrieve Flag from SYSTEM Shell
π Alternative Methods
Non-GUI Exploitation
Automated Approach
π§Ή Cleanup
β οΈ Limitations
Windows Version Restrictions
Detection Indicators
π‘ Key Takeaways
Print Operators group provides SeLoadDriverPrivilege
Capcom.sys driver enables SYSTEM privilege escalation
Registry configuration required for driver loading
Multiple tools available for automation
Mitigated on Windows 10 1803+
Print Operators group exploitation relies on vulnerable driver loading capabilities, effective primarily on legacy Windows systems.
Last updated