πSeDebugPrivilege
π― Overview
π Privilege Fundamentals
SeDebugPrivilege Capabilities
Common Assignment Contexts
# Local/Domain Group Policy assignment:
Computer Settings > Windows Settings > Security Settings > Local Policies > User Rights Assignment
"Debug programs" = SeDebugPrivilegeπ Privilege Detection
Enumeration
πΎ LSASS Memory Dumping
Method 1: ProcDump (SysInternals)
Prerequisites
LSASS Process Dump
Credential Extraction with Mimikatz
Method 2: Task Manager (GUI)
Manual LSASS Dump
β¬οΈ SYSTEM Privilege Escalation
Token Impersonation Technique
Concept
PowerShell PoC Script
Process ID Enumeration
Process Impersonation
Verification
π― HTB Academy Lab Solution
Lab Environment
Step-by-Step Solution
1. RDP Connection
2. Verify SeDebugPrivilege
3. LSASS Memory Dump
4. Credential Extraction
5. Locate sccm_svc Hash
6. Submit Hash
Alternative Approaches
PowerShell-Based Extraction
Task Manager Method
π Detection Indicators
Process Activity
Event Logs
π‘οΈ Defense Strategies
Privilege Hardening
Monitoring and Detection
LSASS Protection
π SeDebugPrivilege Exploitation Checklist
Prerequisites
LSASS Dumping Steps
SYSTEM Escalation Steps
π‘ Key Takeaways
Last updated