πŸ–₯️Server Operators

🎯 Overview

Server Operators group allows administration of Windows servers without Domain Admin privileges. Members can log in locally to Domain Controllers and have full control over local services, enabling privilege escalation through service binary path modification.

πŸ”‘ Key Privileges & Capabilities

# Server Operators privileges:
SeBackupPrivilege            # Backup files and directories
SeRestorePrivilege           # Restore files and directories
SERVICE_ALL_ACCESS           # Full control over local services
# Plus: Log on locally to servers/DCs, control services

πŸ”§ Service Control Exploitation

Service Reconnaissance

# Query service configuration
sc qc AppReadiness

# Expected output:
SERVICE_NAME: AppReadiness
TYPE               : 20  WIN32_SHARE_PROCESS
START_TYPE         : 3   DEMAND_START
BINARY_PATH_NAME   : C:\Windows\System32\svchost.exe -k AppReadiness -p
SERVICE_START_NAME : LocalSystem

Verify Service Permissions

πŸš€ Binary Path Attack

Current Admin Group Check

Modify Service Binary Path

Execute Service (Expected to Fail)

Verify Privilege Escalation

🎯 HTB Academy Lab Solution

Lab Environment

  • Credentials: server_adm:HTB_@cademy_stdnt!

  • Access Method: RDP

  • Target Service: AppReadiness

  • Flag Location: c:\Users\Administrator\Desktop\ServerOperators\flag.txt

Quick Steps

πŸ† Post-Exploitation Capabilities

Domain Controller Access

Domain Credential Extraction

πŸ”„ Alternative Attack Vectors

Other Target Services

Alternative Payloads

⚠️ Detection & Defense

Detection Indicators

Defensive Measures

πŸ’‘ Key Takeaways

  1. Server Operators group provides SERVICE_ALL_ACCESS over local services

  2. Binary path modification enables command execution as SYSTEM

  3. Local administrator access leads to Domain Controller compromise

  4. SeBackupPrivilege provides additional attack vectors

  5. High-impact group requiring careful access control


Server Operators group exploitation leverages service control capabilities for immediate local administrator access and potential domain compromise.

Last updated