πŸ›οΈWindows Built-in Groups

🎯 Overview

Windows Built-in Groups provide specific privileges to enforce least-privilege principles without granting full administrative access. These groups exist on servers from Windows Server 2008 R2 to present, with some exceptions. Understanding membership implications is crucial for both privilege escalation and security assessment.

πŸ›οΈ Key Built-in Groups

High-Privilege Groups

Group
Key Privileges
Attack Potential

Backup Operators

SeBackup, SeRestore

NTDS.dit access, file system bypass

Event Log Readers

Event log access

Sensitive log data extraction

DnsAdmins

DNS service control

Code execution via DLL injection

Hyper-V Administrators

VM management

VM escape, hypervisor attacks

Print Operators

Print service control

Service manipulation attacks

Server Operators

Service management

Service privilege escalation

Assignment Contexts

# Common reasons for assignment:
- Least privilege enforcement (avoiding Domain Admin creation)
- Vendor application requirements
- Backup and restore operations
- Testing scenarios (often forgotten)
- Service account requirements

Assessment Priority:

  • Always enumerate group memberships (whoami /groups)

  • Document excessive/unnecessary memberships

  • Review historical assignments (leftovers from testing)

πŸ” Backup Operators - SeBackupPrivilege Exploitation

Privilege Fundamentals

SeBackupPrivilege Capabilities

  • Folder traversal without ACL restrictions

  • File copying from protected directories

  • Registry hive backup (SAM, SYSTEM, SECURITY)

  • NTDS.dit access on Domain Controllers

  • ACL bypass with FILE_FLAG_BACKUP_SEMANTICS

Detection and Enablement

Group Membership Verification

Privilege Enumeration

Privilege Activation

Method 1: PowerShell Modules

Method 2: Elevated Context

πŸ’Ύ File System Exploitation

Protected File Access

Standard Access Failure

SeBackupPrivilege Bypass

Registry Hive Extraction

SAM and SYSTEM Backup

🏰 Domain Controller Attacks

NTDS.dit Extraction Strategy

Challenge

  • NTDS.dit contains NTLM hashes for all domain accounts

  • File locked by Active Directory services

  • Restricted access even for privileged users

Solution: Shadow Copy Technique

Step 1: Create Shadow Copy

Step 2: Verify Shadow Copy

Step 3: Copy NTDS.dit

Alternative: Robocopy Method

πŸ”“ Credential Extraction

Method 1: DSInternals Module

Extract Specific Account

Method 2: SecretsDump.py

Extract All Domain Hashes

🎯 HTB Academy Lab Solution

Lab Environment

  • Credentials: svc_backup:HTB_@cademy_stdnt!

  • Access Method: RDP

  • Objective: Leverage SeBackupPrivilege to obtain flag at c:\Users\Administrator\Desktop\SeBackupPrivilege\flag.txt

Detailed Step-by-Step Solution

1. RDP Connection

2. Verify Group Membership

3. Check Privilege Status

4. Enable SeBackupPrivilege

5. Target File Analysis

6. Bypass Restriction with SeBackupPrivilege

Alternative Methods

Method 1: Robocopy Approach

Method 2: Registry Approach (if flag in registry)

⚠️ Limitations and Considerations

Explicit Deny ACEs

Operational Considerations

πŸ” Detection Indicators

Process Activity

Event Logs

File System Changes

πŸ›‘οΈ Defense Strategies

Group Membership Hardening

Monitoring Implementation

Access Controls

πŸ“‹ Backup Operators Exploitation Checklist

Prerequisites

Privilege Activation

File System Exploitation

Domain Controller Attacks

Post-Exploitation

πŸ’‘ Key Takeaways

  1. Backup Operators provides powerful file system access via SeBackupPrivilege

  2. NTDS.dit extraction possible on Domain Controllers through shadow copies

  3. ACL bypass works for most files except explicit DENY entries

  4. Registry access enables local credential extraction (SAM, SYSTEM)

  5. Robocopy alternative eliminates need for external PowerShell modules

  6. Detection possible through privilege usage monitoring and file access logs

  7. Common oversight - accounts left in group after legitimate backup tasks


Backup Operators group membership provides extensive file system access capabilities that can be leveraged for significant privilege escalation, especially in Domain Controller environments.

Last updated