Windows Privesc Flashcards

1
Q

What is the command for systeminfo?

A

systeminfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the command for the hostname?

A

hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the command for the user context?

A

whoami

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the command for the user context and privs (potato exploits)?

A

whoami /priv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Once we have the username, what command produces more information?

A

net user “username”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do we discover other users on the system?

A

net user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do we enumerate the operating systems architecture?

A

systeminfo | findstr /B /C:”OS Name” /C:”OS Version” /C:”System Type”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do we enumerate running services and processes?

A

tasklist /SVC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we enumerate Networking Information?

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do we enumerate routing tables?

A

route print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do we enumerate active network connections?

A

netstat -ano

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do we enumerate active firewall status?

A

netsh advfirewall show currentprofile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do we enumerate active firewall rules?

A

netsh advfirewall firewall show rule name=all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do we enumerate scheduled tasks?

A

schtasks /query /fo LIST /v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do we enumerate installed applications?

A

wmic product get name, version, vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do we enumerate system wide updates?

A

wmic qfe get Caption, Description, HotFixID, InstalledOn

17
Q

How do we enumerate files with readable and writable permissions?

A

accesschk.exe -uws “Everyone” “C:\Program Files” (The path is an example, this can be changed).

18
Q

How do we enumerate unmounted disks?

A

mountvol

19
Q

What are the two commands that enumerate binaries that autoelevate? Why is this important?

A

reg query HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer

reg query HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Installer

This is important because if either of these settings are set to 1, any user can run Windows Installer Packages with elevated privileges (0x1).

20
Q

If we have permission to run Windows Installer Packages what file would we create?

A

An MSI file

21
Q

What are access tokens?

A

When a Windows User is authenticated, they are given a token. This token describes their current security context including their privileges.

22
Q

What is an SID?

A

A Security Identifier. This is a unique object given to each security object, including tokens, and includes users and group accounts.

23
Q

Who generates SIDs?

A

Windows Local Security Authority.

24
Q

Describe what the integrity mechanism is.

A

It prescribes integrity levels application processes and securable objects. It describes the level of trust Windows places in those processes. These also dictate readable and writable permissions.

25
Q

Name the four integrity processes and the respective rights associated with them.

A

System Integrity Process: SYSTEM Rights.
High Integrity Process: Administrative Rights.
Medium Integrity Process: Standard User Rights.
Low Integrity Process: Very restricted rights. Often used in sandboxed processes.

26
Q

Describe and explain User Account Control (UAC).

A

UAC forces applications and tasks to run in the context of a non-administrative account
until an administrator authorizes elevated access.

It will block installers and unauthorized applications from running without the permissions of an administrative account and also blocks changes to system settings.

In general, the effect of UAC is that any application that wishes to perform an operation with a potential system-wide impact, cannot do so silently. At least in theory.

27
Q

Describe the two different modes of UAC.

A

Credential Prompt and Consent Prompt.

Credential Prompt is used when a standard user tries to do an adminstrative action - such as installing a program. It will prompt for an administrators password.

Consent Prompt occurs when an administrative user wishes to do similar, however they are simply asked to consent since they have administrative rights.

Even while logged in as an administrative user, the account will have two security tokens, one
running at a medium integrity level and the other at high integrity level. UAC acts as the separation
mechanism between those two integrity levels.