From Hyper-V Admin to SYSTEM

Another episode of the series: From XXX to SYSTEM ! This time I will show you how it is possible to gain SYSTEM privileges on a Windows machine (a fully patched Win 10 in our case) with HYPER-V enabled and being a member of the special "Hyper-V Administrators" Windows group. I know what you are…

From dropbox(updater) to NT AUTHORITY\SYSTEM

Hardlinks again! Yes, there are plenty of opportunities to raise your privileges due to incorrect permissions settings when combined with¬† hardlinks in many softwares (MS included) ūüėČ In this post I'm going to show how to use the DropBoxUpdater¬† service in order to get SYSTEM privileges starting from a simple Windows user. I found and…

From iPhone to NT AUTHORITY\SYSTEM

As promised in my previous post , I will show you how to exploit the "Printconfig" dll with a real world example. But what does Apple's iPhone have to do with it?? Well, keep on reading... (sorry¬† no TL;DR) Some time ago, me and my "business partner"¬† @padovah4ck, were looking for possible privileged file operations…

From arbitrary file overwrite to SYSTEM

Arbitrary File overwrite has always been considered as a critical vulnerability because it can lead in the "worst case" to privilege escalation. In Windows systems this usually means impersonating Administrators or SYSTEM. If a standard user is able, through some "exploit",¬† to alter the permissions of special protected files -¬† by granting him modify or…

Creating Windows Access Tokens

Some time ago I was playing with the STOPZilla¬†exploit which is very interesting and educational because it shows how you can abuse from an arbitrary write from the userland into the kernel. In this case the exploit will permit us, by altering the EPROCESS structure of the current process,¬† to activate an additional privilege, usually¬†…

Combinig LUAFV PostLuafvPostReadWrite Race Condition PE with DiagHub collector exploit -> from standard user to SYSTEM

In this short post I will show you how¬† to combine Forshaw's¬† Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation¬†with Forshaw's Diaghub Collector exploit.¬† The LUAFV exploit has been fixed recently and rumors are stating that the "core" part of the Diaghub collector exploit (the possibility for a standard user to…

Donkey’s guide to Resource Based Constrained Delegation Exploitation – from simple user to (almost) DA –

In this last period there has been much talk about kerberos delegations abuse, especially the "Resource Based Constrained Delegation". So I started¬† writing this post for my friends @DonkeysTeam but then decided to publish it for a "wider" (just kidding)¬† audience. I won't explain in depth these mechanisms, there are so many articles and blogs…

Windows Named Pipes & Impersonation

  Named pipes are nothing new,¬† it's a an old technology you will find in many operating systems (Unix, Windows,...) to permit asynchronous or synchronous inter-process communication (IPC) on the same computer or on different computers across the network. With named pipes you can send/receive and share¬† data between processes using the memory.¬† They are…