Donkey’s guide to Resource Based Constrained Delegation Exploitation – from simple user to (almost) DA –

In this last period there has been much talk about kerberos delegations abuse, especially the "Resource Based Constrained Delegation". So I started  writing this post for my friends @DonkeysTeam but then decided to publish it for a "wider" (just kidding)  audience. I won't explain in depth these mechanisms, there are so many articles and blogs…

Advertisements

Windows Named Pipes & Impersonation

  Named pipes are nothing new,  it's a an old technology you will find in many operating systems (Unix, Windows,...) to permit asynchronous or synchronous inter-process communication (IPC) on the same computer or on different computers across the network. With named pipes you can send/receive and share  data between processes using the memory.  They are…

Creating Symbolic Links in Windows 10

Creating symbolics links on Windows systems  is a feature which has been added starting from Windows Vista. Unlike Unix, where every user can create symbolic links,  in Windows,  to perform this operation you need a special privilege: SeCreateSymbolicLinkPrivilege. This privilege, if granted, is only available in a high integrity level process.  The reason of this security…

No more rotten/juicy potato?

Recently I downloaded the new Windows server 2019 and upgraded my Win10 box to 1809. Obviously, the first thing I did was to test the juicy/rotten exploit and surprisingly it did not work on both OS (tried aslo with other CLSID's) Remember what MS said about this "vulnerability"? Fear the Rotten/Juicy potato attack? So I'm not…

Fear the Rotten/Juicy potato attack?

As promised, this is the official response from Microsoft when I asked them how to protect against the DCOM/NTLM reflection abuse: "The team has responded that with the current model there are no hardening recommendations we can offer. They are taking this report as something to pursue for next-version hardening but I don't have an…

Juicy Potato (abusing the golden privileges)

Today me and my partner in crime Giuseppe, are releasing our small research with Windows impersonate privileges. The result is a tool named "Juicy Potato", which is a kind of sequel of the potato researches we have been inspired for months (RottenPotatoNG  and its variants). All the information and results have been published here My personal…

The power of backup operators

"Backup Operators" group is an historical Windows built in group. It was designed to allow its members to perform backup and restore operations by granting the SeBackupPrivilege and the SeRestorePrivilege. What does this mean? Well, for some operations like backup and restore, the DACL (Discretionary Access Control Lists) are ignored; this to permit then backup/restore…

Getting SYSTEM

In your red teaming or pentesting activities escalating to  SYSTEM on a Windows box is always the desired objective. The SYSTEM user is a special operating system user with the highest privilege, many post exploitation techniques require this type of access. Of course, in order to get SYSTEM you have be part of the administrators group…

Potatoes and tokens

I just finished playing  with the Rotten Potato C# exploit  in order to get it work standalone that the author  @breenmachine  released the C++ standalone version of  "Rotten Potato". He really did a great job! https://github.com/foxglovesec/RottenPotatoNG  Time for me to play with this new version, dig deeper in some "obscure" Windows API   calls and access tokens …