ποΈWindows Built-in Groups
π― Overview
ποΈ Key Built-in Groups
High-Privilege Groups
Group
Key Privileges
Attack Potential
Assignment Contexts
# Common reasons for assignment:
- Least privilege enforcement (avoiding Domain Admin creation)
- Vendor application requirements
- Backup and restore operations
- Testing scenarios (often forgotten)
- Service account requirementsπ Backup Operators - SeBackupPrivilege Exploitation
Privilege Fundamentals
SeBackupPrivilege Capabilities
Detection and Enablement
Group Membership Verification
Privilege Enumeration
Privilege Activation
Method 1: PowerShell Modules
Method 2: Elevated Context
πΎ File System Exploitation
Protected File Access
Standard Access Failure
SeBackupPrivilege Bypass
Registry Hive Extraction
SAM and SYSTEM Backup
π° Domain Controller Attacks
NTDS.dit Extraction Strategy
Challenge
Solution: Shadow Copy Technique
Step 1: Create Shadow Copy
Step 2: Verify Shadow Copy
Step 3: Copy NTDS.dit
Alternative: Robocopy Method
π Credential Extraction
Method 1: DSInternals Module
Extract Specific Account
Method 2: SecretsDump.py
Extract All Domain Hashes
π― HTB Academy Lab Solution
Lab Environment
Detailed Step-by-Step Solution
1. RDP Connection
2. Verify Group Membership
3. Check Privilege Status
4. Enable SeBackupPrivilege
5. Target File Analysis
6. Bypass Restriction with SeBackupPrivilege
Alternative Methods
Method 1: Robocopy Approach
Method 2: Registry Approach (if flag in registry)
β οΈ Limitations and Considerations
Explicit Deny ACEs
Operational Considerations
π Detection Indicators
Process Activity
Event Logs
File System Changes
π‘οΈ Defense Strategies
Group Membership Hardening
Monitoring Implementation
Access Controls
π Backup Operators Exploitation Checklist
Prerequisites
Privilege Activation
File System Exploitation
Domain Controller Attacks
Post-Exploitation
π‘ Key Takeaways
Last updated