π₯οΈServer Operators
π― Overview
Server Operators group allows administration of Windows servers without Domain Admin privileges. Members can log in locally to Domain Controllers and have full control over local services, enabling privilege escalation through service binary path modification.
π Key Privileges & Capabilities
# Server Operators privileges:
SeBackupPrivilege # Backup files and directories
SeRestorePrivilege # Restore files and directories
SERVICE_ALL_ACCESS # Full control over local services
# Plus: Log on locally to servers/DCs, control servicesπ§ Service Control Exploitation
Service Reconnaissance
# Query service configuration
sc qc AppReadiness
# Expected output:
SERVICE_NAME: AppReadiness
TYPE : 20 WIN32_SHARE_PROCESS
START_TYPE : 3 DEMAND_START
BINARY_PATH_NAME : C:\Windows\System32\svchost.exe -k AppReadiness -p
SERVICE_START_NAME : LocalSystemVerify Service Permissions
π Binary Path Attack
Current Admin Group Check
Modify Service Binary Path
Execute Service (Expected to Fail)
Verify Privilege Escalation
π― HTB Academy Lab Solution
Lab Environment
Credentials:
server_adm:HTB_@cademy_stdnt!Access Method: RDP
Target Service: AppReadiness
Flag Location:
c:\Users\Administrator\Desktop\ServerOperators\flag.txt
Quick Steps
π Post-Exploitation Capabilities
Domain Controller Access
Domain Credential Extraction
π Alternative Attack Vectors
Other Target Services
Alternative Payloads
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Server Operators group provides SERVICE_ALL_ACCESS over local services
Binary path modification enables command execution as SYSTEM
Local administrator access leads to Domain Controller compromise
SeBackupPrivilege provides additional attack vectors
High-impact group requiring careful access control
Server Operators group exploitation leverages service control capabilities for immediate local administrator access and potential domain compromise.
Last updated