ποΈWindows Built-in Groups
π― Overview
Windows Built-in Groups provide specific privileges to enforce least-privilege principles without granting full administrative access. These groups exist on servers from Windows Server 2008 R2 to present, with some exceptions. Understanding membership implications is crucial for both privilege escalation and security assessment.
ποΈ Key Built-in Groups
High-Privilege Groups
Backup Operators
SeBackup, SeRestore
NTDS.dit access, file system bypass
Event Log Readers
Event log access
Sensitive log data extraction
DnsAdmins
DNS service control
Code execution via DLL injection
Hyper-V Administrators
VM management
VM escape, hypervisor attacks
Print Operators
Print service control
Service manipulation attacks
Server Operators
Service management
Service privilege escalation
Assignment Contexts
# Common reasons for assignment:
- Least privilege enforcement (avoiding Domain Admin creation)
- Vendor application requirements
- Backup and restore operations
- Testing scenarios (often forgotten)
- Service account requirementsAssessment Priority:
Always enumerate group memberships (
whoami /groups)Document excessive/unnecessary memberships
Review historical assignments (leftovers from testing)
π Backup Operators - SeBackupPrivilege Exploitation
Privilege Fundamentals
SeBackupPrivilege Capabilities
Folder traversal without ACL restrictions
File copying from protected directories
Registry hive backup (SAM, SYSTEM, SECURITY)
NTDS.dit access on Domain Controllers
ACL bypass with FILE_FLAG_BACKUP_SEMANTICS
Detection and Enablement
Group Membership Verification
Privilege Enumeration
Privilege Activation
Method 1: PowerShell Modules
Method 2: Elevated Context
πΎ File System Exploitation
Protected File Access
Standard Access Failure
SeBackupPrivilege Bypass
Registry Hive Extraction
SAM and SYSTEM Backup
π° Domain Controller Attacks
NTDS.dit Extraction Strategy
Challenge
NTDS.dit contains NTLM hashes for all domain accounts
File locked by Active Directory services
Restricted access even for privileged users
Solution: Shadow Copy Technique
Step 1: Create Shadow Copy
Step 2: Verify Shadow Copy
Step 3: Copy NTDS.dit
Alternative: Robocopy Method
π Credential Extraction
Method 1: DSInternals Module
Extract Specific Account
Method 2: SecretsDump.py
Extract All Domain Hashes
π― HTB Academy Lab Solution
Lab Environment
Credentials:
svc_backup:HTB_@cademy_stdnt!Access Method: RDP
Objective: Leverage SeBackupPrivilege to obtain flag at
c:\Users\Administrator\Desktop\SeBackupPrivilege\flag.txt
Detailed Step-by-Step Solution
1. RDP Connection
2. Verify Group Membership
3. Check Privilege Status
4. Enable SeBackupPrivilege
5. Target File Analysis
6. Bypass Restriction with SeBackupPrivilege
Alternative Methods
Method 1: Robocopy Approach
Method 2: Registry Approach (if flag in registry)
β οΈ Limitations and Considerations
Explicit Deny ACEs
Operational Considerations
π Detection Indicators
Process Activity
Event Logs
File System Changes
π‘οΈ Defense Strategies
Group Membership Hardening
Monitoring Implementation
Access Controls
π Backup Operators Exploitation Checklist
Prerequisites
Privilege Activation
File System Exploitation
Domain Controller Attacks
Post-Exploitation
π‘ Key Takeaways
Backup Operators provides powerful file system access via SeBackupPrivilege
NTDS.dit extraction possible on Domain Controllers through shadow copies
ACL bypass works for most files except explicit DENY entries
Registry access enables local credential extraction (SAM, SYSTEM)
Robocopy alternative eliminates need for external PowerShell modules
Detection possible through privilege usage monitoring and file access logs
Common oversight - accounts left in group after legitimate backup tasks
Backup Operators group membership provides extensive file system access capabilities that can be leveraged for significant privilege escalation, especially in Domain Controller environments.
Last updated