hacktricks/src/windows-hardening/checklist-windows-privilege-escalation.md

9.3 KiB

Orodha ya Ukaguzi - Local Windows Privilege Escalation

{{#include ../banners/hacktricks-training.md}}

Chombo bora cha kutafuta Windows local privilege escalation vectors: WinPEAS

Taarifa za Mfumo

Uchunguzi wa Logging/AV

Mtandao

  • Kagua taarifa za mtandao ya sasa
  • Kagua huduma za ndani zilizofichika zinazotengwa kwa nje

Michakato Inayoendeshwa

  • Idhini za [file and folders] za binaries za michakato (permissions) (windows-local-privilege-escalation/index.html#file-and-folder-permissions)
  • Memory Password mining
  • Insecure GUI apps
  • Pora nywila kwa michakato yenye [vitu vya kuvutia] kwa kutumia ProcDump.exe ? (firefox, chrome, n.k.)

Services

  • Je, unaweza kubadilisha service yoyote? (windows-local-privilege-escalation/index.html#permissions)
  • Je, unaweza kubadilisha binary inayotekelezwa na service yoyote? (windows-local-privilege-escalation/index.html#modify-service-binary-path)
  • Je, unaweza kubadilisha registry ya service yoyote? (windows-local-privilege-escalation/index.html#services-registry-modify-permissions)
  • Je, unaweza kuchukua faida ya njia ya binary isiyo na nukuu ya service yoyote? (windows-local-privilege-escalation/index.html#unquoted-service-paths)

Programu

DLL Hijacking

  • Je, unaweza kuandika katika folda yoyote ndani ya PATH?
  • Je, kuna binary ya service inayojulikana ambayo inajaribu kupakia DLL isiyokuwepo?
  • Je, unaweza kuandika katika folder za binaries yoyote?

Mtandao

  • Fanya uorodheshaji wa mtandao (shares, interfaces, routes, neighbours, ...)
  • Tazama kwa makini huduma za mtandao zinazolisikiliza localhost (127.0.0.1)

Windows Credentials

Files and Registry (Credentials)

Leaked Handlers

  • Je, una ufikiaji wa handler yoyote ya mchakato unaoendeshwa na administrator?

Pipe Client Impersonation

  • Kagua kama unaweza kuiboresha (abuse) hiyo

{{#include ../banners/hacktricks-training.md}}