πŸ–¨οΈPrint Operators

🎯 Overview

Print Operators group grants SeLoadDriverPrivilege, allowing members to load device drivers. This privilege can be exploited to load malicious drivers like Capcom.sys for SYSTEM privilege escalation.

πŸ”‘ Key Privileges & Capabilities

# Print Operators privileges:
SeLoadDriverPrivilege         # Load and unload device drivers
SeShutdownPrivilege           # Shut down Domain Controller
# Plus: manage printers, log on locally to DC

πŸ”§ Driver Loading Exploitation

Privilege Verification

# Check privileges (may need UAC bypass first)
whoami /priv

# Expected output:
SeLoadDriverPrivilege         Load and unload device drivers       Disabled

Capcom.sys Driver Attack

1. Registry Configuration

2. Enable Privilege & Load Driver

3. Exploit Driver for SYSTEM

🎯 HTB Academy Lab Solution

Lab Environment

  • Credentials: printsvc:HTB_@cademy_stdnt!

  • Access Method: xfreerdp

  • Tools Location: C:\Tools\ and C:\Tools\ExploitCapcom\

  • Objective: Escalate to SYSTEM and retrieve flag from Administrator desktop

  • Flag: Pr1nt_0p3rat0rs_ftw!

Detailed Walkthrough

1. Connect via RDP

2. Open Elevated Command Prompt

3. Navigate to Tools and Execute EoPLoadDriver

4. Navigate to ExploitCapcom Directory

5. Retrieve Flag from SYSTEM Shell

πŸ”„ Alternative Methods

Non-GUI Exploitation

Automated Approach

🧹 Cleanup

⚠️ Limitations

Windows Version Restrictions

Detection Indicators

πŸ’‘ Key Takeaways

  1. Print Operators group provides SeLoadDriverPrivilege

  2. Capcom.sys driver enables SYSTEM privilege escalation

  3. Registry configuration required for driver loading

  4. Multiple tools available for automation

  5. Mitigated on Windows 10 1803+


Print Operators group exploitation relies on vulnerable driver loading capabilities, effective primarily on legacy Windows systems.

Last updated