8.Windows-built-in-groups
Approach to Exploiting Windows Built-in Groups (Focus: Backup Operators)
Identify Group Memberships:
Verify SeBackupPrivilege:
Enable SeBackupPrivilege (if needed):
Import SeBackupPrivilege Modules:
Access Protected Files:
Target Domain Controller (NTDS.dit):
Backup Registry Hives:
Extract Credentials (NTDS.dit):
Commands:
PowerShell Cmdlets:
Tools:
diskshadow.exe
(Windows built-in)reg.exe
(Windows built-in)secretsdump.py
(Impacket)robocopy.exe
(Windows built-in)DSInternals
(PowerShell module)SeBackupPrivilegeUtils.dll
andSeBackupPrivilegeCmdLets.dll
(Custom PowerShell modules)
Techniques:
Leverage
SeBackupPrivilege
to bypass file ACLs.Use
diskshadow
to create shadow copies of locked files.Extract credentials from
NTDS.dit
and registry hives.Use
robocopy
as an alternative to custom scripts.
Last updated